Vous êtes sur la page 1sur 3

ASSIGNMENT 2

Date of allotment Date of submission

09-Sep-19 23-Sep-19

SET-1
Q1. Discuss DOS and DDOS.

Q2. Briefly discuss the attacks on the network or a system.

Q3. Is Virus different from the Trojan Horses.? Justify.

Q4. List the damages caused by Malware?

SET-2
Q1. Enlist various security threats in the system with brief discription.

Q2. Give your views on social engineering.

Q3. How Keyloggers violate the security of the system. Justify.

Q4. Discuss the concept of port scanning?

SET-3
Q1. Phishing is one of the major security threat, Justify.

Q2. DOS attack and its type.

Q3. How Spywareare transferred?

Q4. Enlist the objectives, with which the malicious attackers attack the system.

SET-4
Q1. Concept of spamming.

Q2. Discuss Port scanning.

Q3. Illustrate some of the ways to crack the password.

Q4. Security measures needed to protect the system.


SET-5
Q1. Create a virus which shuts down the system.

Q2. Study the nature of any virus and point out its effects.

Q3. Purpose of triggers in viruses.

Q4. If my virus is unable to propagate can I call it a virus, Justify ?

SET-6
Q1. From where does spamming originates?

Q2. Spamming a good option for advertisement, justify.

Q3. If you see a luring offer in your email bu you are not sure of the origin of the email.
What may be the possible security threat in it.

Q4. Do you think the Blue Whale game is a security threat in any way?

SET-7
Q1. You can buy the iPhone x for just 10000. If you get this email and someone asks you
to click on some link and fill your details? What may be possible threat in this case?

Q2. If we clicks on unknown links enlist the problems one can face.

Q3. If you don’t have a extended validation certificate on your website what may
possibly go wrong with you?

Q4. Show how phishing is done.

SET 8
Q1: The Denial of service act can be accomplished by flooding the network with service
requests leading to resource exhaustion. Do you agree with this? Justify.

Q2: Compare Active and Passive attacks.

Q3: Do hardening the OS improves security? Justify.

Q4. Do you think the Blue Whale game is a security threat in any way?

SET 9
Q1. How Key loggers violate the security of the system. Justify.

Q2. Discuss the concept of port scanning?


Q3. If you don’t have a extended validation certificate on your website what may
possibly go wrong with you?

Q4. How spywares are transferred?

SET 10
Q1: Discuss CAN and CVE.
Q2: Various challenges in information security with examples for each challenge that you
are writing.

Q3: How can you identify the identity of websites and ensure that you are safe from
attacks?

Q4: Show how phishing is done.

SET 11
Q1. Study the nature of any virus and point out its effects.

Q2: Do hardening the OS improves security? Justify.

Q3: Study the nature of any virus and point out its effects.

SET12
Q1: Is Virus different from the Trojan Horses.? Justify.

Q2: List the damages caused by Malware?

Q3: The Denial of service act can be accomplished by flooding the network with service
requests

leading to resource exhaustion. Do you agree with this? Justify.

Q4. Discuss Security measures needed to protect the system

Assignment Marking Scheme


1. This element of the scheme is contributing 12 marks.
2. The teacher is being asked to take three assignment (the number of
questions and marks are left flexible to the choice of the teacher according to the
subject) which leads to total marks equal to 12

Vous aimerez peut-être aussi