IT SECURITY
***********
Giv priority to Technical terms...
***************
26.10.2019 MEMORY BASED RECOLLECTED QUESTIONS
Salomi technique
Accountability- biometric login wat d user has/knows/is
Access control
Access privilege
Maker checker principle
Ciso/cfo role
Anti piracy
Thteat/vulnerability/impact
RFID radio frequency identification
Perimeter security
3 most common metal detector
Fire extinguishers
E waste
BYOT/BYOD /work from home
Commonly used sever
Router/modem/switch/gateway
White box/black box testing
Alpha/beta testing
ISO certfctn standard specifctn
COBIT
STEGNOGRAPHY/RANSOMWARE/CYBER TERRORISM/SOCIAL ENGG
DOS/DDOS
CAPTCHA
MALWARE/SPYWARE/ADWARE/ROOTKIT/BOTNETS
FASTFLUX/STUXNET
HOTSITE/WARMSITE/COLDSITE
IS AUDIT QUALIFCTNS
GUIDELINES FOR FRAUD PREVENTION
FSDC
***********
Giv priority to Technical terms...
***************
26.10.2019 MEMORY BASED RECOLLECTED QUESTIONS
Salomi technique
Accountability- biometric login wat d user has/knows/is
Access control
Access privilege
Maker checker principle
Ciso/cfo role
Anti piracy
Thteat/vulnerability/impact
RFID radio frequency identification
Perimeter security
3 most common metal detector
Fire extinguishers
E waste
BYOT/BYOD /work from home
Commonly used sever
Router/modem/switch/gateway
White box/black box testing
Alpha/beta testing
ISO certfctn standard specifctn
COBIT
STEGNOGRAPHY/RANSOMWARE/CYBER TERRORISM/SOCIAL ENGG
DOS/DDOS
CAPTCHA
MALWARE/SPYWARE/ADWARE/ROOTKIT/BOTNETS
FASTFLUX/STUXNET
HOTSITE/WARMSITE/COLDSITE
IS AUDIT QUALIFCTNS
GUIDELINES FOR FRAUD PREVENTION
FSDC
No comments:
Post a Comment