Sunday, 15 July 2018

Today IT security recollected questions

IT Security recollected questions 15-07-18

Non repudiation,access privilege,2FA,CISO,corporate  IT Security,DRM,Threat,vulnerabilities,risk appetite,sec governance,rfid,ips,ids,bar coding,metal detectors,fire extinguishers,testing methodologies 2-3 questions,cloud computing 2-3 questions,cdr,iso 27001,cobit,etsi tc cyber,Sox,sas 70,defense in depth,green server,refurbishment,dumpster driving,social eng,database schema,atm security,jackpotting,escrow arrangement 2 questions,spf,vlans,mpls,ftp,firewalls,siem,s/w models,big data,buffer overflow,stuxnet,botnet,fast flux,rootkit,San,drsite,Indian fin sys,powers of rbi

Most of d questions wr of the type (what is not),(which is wrong)



IT security recollected questions

IT act defines data as

Information is classified based on criticality, confidentiality, availability and purpose

Information security is protection of information assets

Non repudiation definition

Which of the following is not a perimeter security method

IT security is responsibility of All employees in an organisation

CISO will not report to CIO

Access previlage: clerical staff cannot make loan disbursement

What is pretty good privacy

Digital right management involves copy right and antipiracy technology

Difference between threat and vulnerability

Definitions of threat vulnerability impact and risk

Crime is not because of need, opportunity and rationalization. One wrong option

2 questions on metal detectors

Which of the following is not an intrusion detection systems - biometric tools

Social engineering is done by

SQL injection definition

Buffer overflow definition

First digital weapon used in PLC - stuxnet

Which of the following is not true regarding cyber terrorism

Malware that targets industrial and software equipment - stuxnet

Fast flux definition

Rootkit related question

What do you understand by the term hijacker

What is the concern faced by security managers in BYOD technology

Case study type question on single point failure

Features of fault tolerant system-2 questions

One of the following is not a requisite for fault tolerance

One of the following is not true regarding high availability-latency, raid,

Questions on white box testing and black testing

Software fault tolerance methods include recovery blocks, n programming, acceptance tests

Recovery time objective., recovery point objective

Robo backup

DR site location in seismic zone

Hot site, warm site

Secondary site located in same city as primary data centre

Auditing around the computer, auditing through the computer, auditing with computer

COBIT is not a security standard

Latest version of COBIT is COBIT 5

Audit risk definition

RBI, sebi, tria and irda regulates (match the following)

One of the following is not the role of RBI

Call data record includes

One of the following is not included in IT act

Version control

Escrow arrangement

Cloud computing and big data

No comments:

Post a Comment