Recalled Questions IT Security (8/11/2020)
Slot 1
Owner , custodian, User
RFID
Internet Access Policy
Beat Frequency Oscillator
IPS & IDS Differance
Network server
HPs open View software
Blade server
Authorization and authentication
Salami Technique can be detected by
Beta Testing
VoIP
QMS
ISMS
Plan do check act (PCDA)
COBIT ISACA SOX GAIT HIPAA SAS70
Defense in Depth
Critical servers in most bank are on UNIX
schema
Hubs
MPLS SMTP
cryptography steganography
application layer firewall are also called as PROXY firewall
Drawbacks of using in house software development
Cyber espionage
DRP
Audit charter
SEBI act 1992
CDR call details record
regsvr32 command
RBI Vision 2018(2 questions)
Shimming skimming
Big data
SHA 512
Server Cluster
Difference between virus and worm
Hot site and warm site
HA in BC DRP means
defence against eavesdropping
Sniffer
third party access to critical info resources area
edit the Registry using Command in windows
RuPay Visa Master card
Bancs
Cvv 3D
Stages in software development
Black box testing
Paper was moderat
.5 marks question on cobit kyc it act rti act software development level
1 marks question on software development process and it security
2 marks question on study based
Questions were from all segments
ISO related questions
Difference between skimming and shimming
Difference between cryptography and steganography
One question on metal detector
One question on software testing related
Defence in depth
No comments:
Post a Comment