×
Everything you do now is for your future. Think About that.
--Your friends at LectureNotes
Close

Note for Cyber Security - cs by sharma devaraju

  • Cyber Security - cs
  • Note
  • JNTU HYDERABAD - JNTUH
  • 10 Views
  • Uploaded 3 months ago
Sharma Devaraju
Sharma Devaraju
0 User(s)
Download PDFOrder Printed Copy

Share it with your friends

Leave your Comments

Text from page-1

Set - 1 MAHAVEER INSTITUTE OF SCIENCE AND TECHNOLOGY Bandlaguda, Chandrayangutta, Hyderabad, Telangana 500005 M.Tech (Mech) I SEM MID-TERM II EXAMS NOVEMBER/2018 FUNDAMENTALS OF CYBER SECURITY Answer all the questions 1. 2. 3. 4. 5. What is DNS? What Is malware? What is Torjan? What is Software Updates and Patches? What is Data Destruction? Answer any two questions. 1. 2. 3. 4. 5. 3 x 5 = 15 2 x 5 = 10 What is operating system? Explain operating system security. Explain web security. What is firewall? Explain firewall policy. What is attack? Explain software based attack. How the Cyber-crime can be of classified explain it in step wise . Set - 2 MAHAVEER INSTITUTE OF SCIENCE AND TECHNOLOGY Bandlaguda, Chandrayangutta, Hyderabad, Telangana 500005 M.Tech (Mech) I SEM MID-TERM II EXAMS NOVEMBER/2018 FUNDAMENTALS OF CYBER SECURITY Answer all the questions 1. 2. 3. 4. 5. What is Cyber-Terrorism? What Is Cyber –War? What is Torjan? What is Cloud Computing Security? Define Data Destruction? Answer any two questions. 1. 2. 3. 4. 5. 3 x 5 = 15 Explain recent trends in cyber security. Explain Security Functions of operating system. How the Cyber-crime can be of classified explain it in step wise Explain Attacks in mobile devices. What is attack? What are the software based attacks? 2 x 5 = 10

Text from page-2

Set - 3 MAHAVEER INSTITUTE OF SCIENCE AND TECHNOLOGY Bandlaguda, Chandrayangutta, Hyderabad, Telangana 500005 M.Tech (Mech) I SEM MID-TERM II EXAMS NOVEMBER/2018 FUNDAMENTALS OF CYBER SECURITY Answer all the questions 1. 2. 3. 4. 5. What is Data Encryption? What Is wireless communications? What is UTM? What is Cloud Computing Security? Define Data Destruction? Answer any two questions. 1. 2. 3. 4. 5. 3 x 5 = 15 How the Cyber-crime can be of classified explain it in step wise What are the policies of firewall? Explain recent trends in cyber security. Explain Attacks in mobile devices. What is attack? What are the software based attacks? 2 x 5 = 10

Lecture Notes