0% found this document useful (0 votes)
17 views2 pages

QB Nis Ut1

The document is a question bank for a unit test on Network and Information Security, covering topics such as computer security, user authentication, access controls, and cryptography. It includes definitions, comparisons, and explanations of various concepts, as well as specific questions related to viruses, attacks, and biometric methods. The questions are categorized into 2-mark and 4-mark sections, providing a structured approach to assessing knowledge in these areas.

Uploaded by

muleayush848
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

QB Nis Ut1

The document is a question bank for a unit test on Network and Information Security, covering topics such as computer security, user authentication, access controls, and cryptography. It includes definitions, comparisons, and explanations of various concepts, as well as specific questions related to viruses, attacks, and biometric methods. The questions are categorized into 2-mark and 4-mark sections, providing a structured approach to assessing knowledge in these areas.

Uploaded by

muleayush848
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

NETWORK AND INFORMATION SECURITY: 22620

Unit Test: I Course: IF/ CM 6I


Question Bank (I scheme)
Chapter 1: INTRODUCTION TO COMPUTER AND INFORMATION SECURITY (CO1)

2 Marks
1. DEFINE: 1) Vulnerability 2) Threats 3) Assets 4) Counter Measures
2. What is VIRUS? List Different Phases of Viruses
3. What is Computer Security? List needs of Computer Security (any three).
4. Compare Intruders and Insiders (4 Points)
5. Define: 1) Hotfix 2) Patch
6. What is Information. Give importance of information?

4 Marks
1. List different types of viruses. Explain any two.
2. List different Types of Attacks. Explain DDOS Attack
3. Explain CIA Security Model with neat diagram.
4. List criteria for classification of Information. Explain any three.
5. Explain 1) Active Attack 2) Passive Attack.

Chapter 2 – USER AUTHENTICATION AND ACCESS CONTROLS (CO2)

2 Marks

1. Define: 1) Authentication 2) Biometrics 3) Access controls 4) Authorization


2. List and Explain password guessing strategies (Any Two).
3. Explain fingerprint in biometric.
4. Explain voice patterns in biometric.
5. Explain Signature & writing patterns in biometric.

4 Marks

1. Explain Authentication Mechanism.


2. List three types of password attack & Explain any Two.
3. Explain given access control Policies: 1) DAC 2) MAC
4. Explain Keystrokes and Handprint in biometrics

Chapter 3 – CRYPTOGRAPHY (CO3)

2 marks

1. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption


2. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography
3. Convert Plain text using Caesar’s Cipher method (Shift =3). Plain Text: ABCDEFGHIJKLXYZ
4Marks

1) Explain Caesar’s Cipher method and convert given text using Caesar’s cipher (Shift =3)
Text: “Come home tomorrow”
2) Apply simple Columnar Transposition Technique for text “WELCOME COME” and
Key= ZEBRAS
3) Compare Substitution Cipher and Transposition Cipher (4 points)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy