IT Security recollected questions 15-07-18
Non repudiation,access privilege,2FA,CISO,corporate IT Security,DRM,Threat,vulnerabilities,risk appetite,sec governance,rfid,ips,ids,bar coding,metal detectors,fire extinguishers,testing methodologies 2-3 questions,cloud computing 2-3 questions,cdr,iso 27001,cobit,etsi tc cyber,Sox,sas 70,defense in depth,green server,refurbishment,dumpster driving,social eng,database schema,atm security,jackpotting,escrow arrangement 2 questions,spf,vlans,mpls,ftp,firewalls,siem,s/w models,big data,buffer overflow,stuxnet,botnet,fast flux,rootkit,San,drsite,Indian fin sys,powers of rbi
Most of d questions wr of the type (what is not),(which is wrong)
IT security recollected questions
IT act defines data as
Information is classified based on criticality, confidentiality, availability and purpose
Information security is protection of information assets
Non repudiation definition
Which of the following is not a perimeter security method
IT security is responsibility of All employees in an organisation
CISO will not report to CIO
Access previlage: clerical staff cannot make loan disbursement
What is pretty good privacy
Digital right management involves copy right and antipiracy technology
Difference between threat and vulnerability
Definitions of threat vulnerability impact and risk
Crime is not because of need, opportunity and rationalization. One wrong option
2 questions on metal detectors
Which of the following is not an intrusion detection systems - biometric tools
Social engineering is done by
SQL injection definition
Buffer overflow definition
First digital weapon used in PLC - stuxnet
Which of the following is not true regarding cyber terrorism
Malware that targets industrial and software equipment - stuxnet
Fast flux definition
Rootkit related question
What do you understand by the term hijacker
What is the concern faced by security managers in BYOD technology
Case study type question on single point failure
Features of fault tolerant system-2 questions
One of the following is not a requisite for fault tolerance
One of the following is not true regarding high availability-latency, raid,
Questions on white box testing and black testing
Software fault tolerance methods include recovery blocks, n programming, acceptance tests
Recovery time objective., recovery point objective
Robo backup
DR site location in seismic zone
Hot site, warm site
Secondary site located in same city as primary data centre
Auditing around the computer, auditing through the computer, auditing with computer
COBIT is not a security standard
Latest version of COBIT is COBIT 5
Audit risk definition
RBI, sebi, tria and irda regulates (match the following)
One of the following is not the role of RBI
Call data record includes
One of the following is not included in IT act
Version control
Escrow arrangement
Cloud computing and big data
Non repudiation,access privilege,2FA,CISO,corporate IT Security,DRM,Threat,vulnerabilities,risk appetite,sec governance,rfid,ips,ids,bar coding,metal detectors,fire extinguishers,testing methodologies 2-3 questions,cloud computing 2-3 questions,cdr,iso 27001,cobit,etsi tc cyber,Sox,sas 70,defense in depth,green server,refurbishment,dumpster driving,social eng,database schema,atm security,jackpotting,escrow arrangement 2 questions,spf,vlans,mpls,ftp,firewalls,siem,s/w models,big data,buffer overflow,stuxnet,botnet,fast flux,rootkit,San,drsite,Indian fin sys,powers of rbi
Most of d questions wr of the type (what is not),(which is wrong)
IT security recollected questions
IT act defines data as
Information is classified based on criticality, confidentiality, availability and purpose
Information security is protection of information assets
Non repudiation definition
Which of the following is not a perimeter security method
IT security is responsibility of All employees in an organisation
CISO will not report to CIO
Access previlage: clerical staff cannot make loan disbursement
What is pretty good privacy
Digital right management involves copy right and antipiracy technology
Difference between threat and vulnerability
Definitions of threat vulnerability impact and risk
Crime is not because of need, opportunity and rationalization. One wrong option
2 questions on metal detectors
Which of the following is not an intrusion detection systems - biometric tools
Social engineering is done by
SQL injection definition
Buffer overflow definition
First digital weapon used in PLC - stuxnet
Which of the following is not true regarding cyber terrorism
Malware that targets industrial and software equipment - stuxnet
Fast flux definition
Rootkit related question
What do you understand by the term hijacker
What is the concern faced by security managers in BYOD technology
Case study type question on single point failure
Features of fault tolerant system-2 questions
One of the following is not a requisite for fault tolerance
One of the following is not true regarding high availability-latency, raid,
Questions on white box testing and black testing
Software fault tolerance methods include recovery blocks, n programming, acceptance tests
Recovery time objective., recovery point objective
Robo backup
DR site location in seismic zone
Hot site, warm site
Secondary site located in same city as primary data centre
Auditing around the computer, auditing through the computer, auditing with computer
COBIT is not a security standard
Latest version of COBIT is COBIT 5
Audit risk definition
RBI, sebi, tria and irda regulates (match the following)
One of the following is not the role of RBI
Call data record includes
One of the following is not included in IT act
Version control
Escrow arrangement
Cloud computing and big data
No comments:
Post a Comment