Monday, 20 January 2020

IT security recollected questions on 19.01.2020

Recollected questions on IT security
19.01.2020


1. Major change in It act 2008 and IT act 2000
2. which act is ammened after CTS ? choices r Rbi a t BR act  Indian evudence act
3.It security s resoonsible fir all employes and driver is CiSO
4.Ciso will report to Hirm
5. Threat vulnerability case study
6. Threat vector
7.crime s not bcos of oppurtnty need ratiaisation answer s inteligence
8.Which metal dector is used in inland indepth
9. which metal detector cannot diferentiate metals
10. which does not comes under indepth Security
11.SQL injection
12. case study qn on Rootkit
1e.RTP
14.ROP
15.unit twating /whitebox/ blackbox testing
16. warm site/ cold site
17. COBIT developed by which agency of USA
18.which ia bench mark of Indian security stds COBIT OR IASA
19. what has to be hand over to conpany in case of Escrow arrangement- Source code
20. When it has to handover and who should demand the codes under escrow agreemnt
30.salomi technique
31. Acess control case study
32. Acess control policy is for Physical acess or al type access
33. For software protection no physical security s needed or physic security is fully needed or partly if it s a single pC.
34.Maker checker checjer has role power more than maker.
35which is cheaper RFID or Barcode reader
36. wether both bar code reader and RFID can be scanned with same scanner?
37.when a sytem ahould be Tagged with RFId as soon as it is bought or wen it is brought yo the company erc.
38. Arranging the sequence of Physical.movembt of   Hardwares like listing sequencing tagging etc. 
39. life cycle of aoftware devepmnetn lik planning devolping testing implementing and the mam twist is wether maintannce comes under life cycle of developing or the life cycl ends with inplementing only.?
40.which fire extinguisher to b used in setver room Co2
41.CAPtCha is case sensitive
42.stenography/ cryptography.
43 Malware/ spyware/ Addware/ Botner
44. wether Botnet iz a malwRe,?
45. Wanna cry is a ransomware
46. Some question was abt layers in Osi model
47.Ddos
48.dual core process
49. Trapdoor
50.Bit glass
51. Digital india aims at - bringing internet  and e governancce to all parts of society
t2. Cobit is computer governance or IT governamce
53. which ia important in bank customer data prootection along with adata centre or Only dafa centres hvng other data?
54. Atm jackpotti g
55. Green dispensor
56.Load balancing
57. wether security policy of a company is confidential or it can be known to all
58.PGP
59.Dumbster Drving
50. which technique if used for mallicious intention bcomes crime - Sniffing
60. Iso 27700 /27001/27002 _ 2 questions
61. open source application - MS word
62. PCI dss used for??
63. Iaas Paas
76. In buffef overflow attacker targets_ stack
77. secuirty to be ensured untill last mile
78. -Network attac hed storage
79. why disk duplex is better than disk miroring
80.Zeus is a malware attacking banks
81. Zombies
82.spiral model/ iterative model/ waterfall model case study
83.jitter technology
84. pDC (plan do chek)
85. which std is used for life çycle Iso/iec 5288:2008

Questions are modearaate. Taxman book is more than enough to pass. If V COMPLete Cyber crime and fraud managemnt exam before completing IT security it will be easier since 30% questions can be related.

In Taxman book at the end of Each topic few topics were given under the title "KEY WORDS". Most questions are from that.

No comments:

Post a Comment