Académique Documents
Professionnel Documents
Culture Documents
09-Sep-19 23-Sep-19
SET-1
Q1. Discuss DOS and DDOS.
SET-2
Q1. Enlist various security threats in the system with brief discription.
SET-3
Q1. Phishing is one of the major security threat, Justify.
Q4. Enlist the objectives, with which the malicious attackers attack the system.
SET-4
Q1. Concept of spamming.
Q2. Study the nature of any virus and point out its effects.
SET-6
Q1. From where does spamming originates?
Q3. If you see a luring offer in your email bu you are not sure of the origin of the email.
What may be the possible security threat in it.
Q4. Do you think the Blue Whale game is a security threat in any way?
SET-7
Q1. You can buy the iPhone x for just 10000. If you get this email and someone asks you
to click on some link and fill your details? What may be possible threat in this case?
Q2. If we clicks on unknown links enlist the problems one can face.
Q3. If you don’t have a extended validation certificate on your website what may
possibly go wrong with you?
SET 8
Q1: The Denial of service act can be accomplished by flooding the network with service
requests leading to resource exhaustion. Do you agree with this? Justify.
Q4. Do you think the Blue Whale game is a security threat in any way?
SET 9
Q1. How Key loggers violate the security of the system. Justify.
SET 10
Q1: Discuss CAN and CVE.
Q2: Various challenges in information security with examples for each challenge that you
are writing.
Q3: How can you identify the identity of websites and ensure that you are safe from
attacks?
SET 11
Q1. Study the nature of any virus and point out its effects.
Q3: Study the nature of any virus and point out its effects.
SET12
Q1: Is Virus different from the Trojan Horses.? Justify.
Q3: The Denial of service act can be accomplished by flooding the network with service
requests