Is - QB
Is - QB
online
More Academy
                                           Information
                                           Security
                                                UNIT I
Information Security Overview
*1. What is the importance of information protection? Explain with examples.
    Prevents unauthorized access, data breaches, and identity theft.
    Ensures confidentiality, integrity, and availability (CIA Triad).
    Example: Protecting customer financial data from cybercriminals.
2. Explain various components used to build a security program.
    Policies & Procedures – Define security standards.
    Risk Management – Identify and mitigate security threats.
    Access Control – Restrict unauthorized access.
    Incident Response – Prepare for and handle security breaches.
    Security Awareness Training – Educate employees on security best practices.
    Monitoring & Auditing – Detect and analyze threats.
3. Comment on: “Achieving 100 percent protection against all conceivable
attacks is an impossible job.”
    Attackers constantly evolve their techniques.
    Zero-day vulnerabilities can be exploited before detection.
    Human errors remain a weak link.
    Security is about risk reduction, not absolute protection.
*4. Explain the best practices for network defense.
    Implement firewalls and intrusion detection/prevention systems (IDS/IPS).
    Use strong encryption for data transmission.
    Apply multi-factor authentication (MFA).
    Regularly update and patch systems.
    Conduct security audits and penetration testing.
    Train employees on cybersecurity awareness.
*5. Explain the Three D’s of Security (Defense, Detection, and Deterrence) with
examples.
    Defense – Use firewalls, antivirus, and secure networks.
    Detection – Monitor logs, IDS/IPS, and anomaly detection.
    Deterrence – Legal actions, security policies, and awareness training.
                                                  Page 1 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                                  Page 2 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                     BSC IT: SEM -VI SQA
                                                     Page 3 of 18
                                YouTube - Abhay More | Telegram - abhay_more
      607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                               UNIT II
Authentication and Authorization
1. Define authentication. Explain the two parts of authentication.
    Authentication: The process of verifying the identity of a user or system.
    Two parts of authentication:
        1. Identification – Claiming an identity (e.g., entering a username).
        2. Verification – Proving the identity (e.g., password, biometric scan).
*2. Explain different types of authentication in detail.
    Types of Authentication:
        1. Password-based (static, dynamic, one-time passwords)
        2. Biometric-based (fingerprint, iris scan)
        3. Multi-Factor Authentication (MFA) (combination of methods)
        4. Certificate-Based Authentication (uses digital certificates)
        5. Kerberos Authentication (ticket-granting system)
        6. Extensible Authentication Protocol (EAP) (supports multiple
           authentication mechanisms)
*3. How does the Kerberos Authentication Process take place? Explain each
step with a diagram.
    Steps in Kerberos Authentication:
        1. Client request authentication from the Key Distribution Center (KDC).
        2. KDC issues a Ticket Granting Ticket (TGT) to the client.
        3. Client requests service ticket using TGT.
        4. KDC grants service ticket to the requested service.
        5. Client accesses the service using the service ticket.
    Diagram needed.
4. Explain certificate-based authentication in detail.
    Uses digital certificates to verify identity.
    Involves Public Key Infrastructure (PKI).
    Steps:
                                                  Page 4 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
Encryption
6. Explain public key cryptography.
    Uses two keys: Public Key (shared) and Private Key (kept secret).
    Example: RSA Algorithm
    Applications: Digital signatures, secure email, SSL/TLS.
7. Write a note on symmetric key cryptography.
    Uses a single key for encryption and decryption.
    Faster than public-key cryptography.
    Examples: AES, DES, Blowfish.
*8. Describe asymmetric and symmetric key encryption.
 Feature Symmetric Key Encryption Asymmetric Key Encryption
 Keys Used Single Key                        Public and Private Key
 Speed        Faster                         Slower
 Security     Less secure                    More secure
 Examples AES, DES                           RSA, ECC
*9. Explain the role of PKI (Public Key Infrastructure) in Security and its
structure.
    PKI Role: Ensures secure communication using encryption and digital
      certificates.
    PKI Components:
          1. Certificate Authority (CA) – Issues digital certificates.
          2. Registration Authority (RA) – Verifies identity.
          3. Public & Private Keys – Used for encryption and authentication.
10. What are ciphers? Explain "Transposition Cipher" vs. "Substitution
Cipher."
    Cipher: Algorithm for encrypting and decrypting data.
    Transposition Cipher: Rearranges letters without changing them.
    Substitution Cipher: Replaces letters with other symbols (e.g., Caesar cipher).
Storage Security
                                                  Page 5 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
*11. What are the three primary categories of storage infrastructure in modern
storage security?
   1. Direct Attached Storage (DAS)
   2. Network Attached Storage (NAS)
   3. Storage Area Network (SAN)
*12. What is the concept of zoning in fundamental storage infrastructure?
    Zoning: Restricts access between devices in a Storage Area Network (SAN).
    Types:
         1. Hard zoning (hardware-based restrictions).
         2. Soft zoning (software-based restrictions).
Database Security
13. Explain database-level security.
    Protects databases from unauthorized access.
    Includes:
         1. User authentication (passwords, multi-factor authentication).
         2. Data encryption (safeguarding data at rest and in transit).
         3. Access control (role-based access, least privilege principle).
*14. Explain different types of database backups.
   1. Full Backup – Copies the entire database.
   2. Incremental Backup – Copies only changes since the last backup.
   3. Differential Backup – Copies changes since the last full backup.
   4. Log Backup – Captures database logs for recovery.
15. Explain the importance of database backups.
    Protects data from loss or corruption.
    Ensures quick recovery in case of failure.
    Prevents downtime in business operations.
16. Explain Role-Based Access Control (RBAC).
    Access is assigned based on user roles (e.g., Admin, User, Guest).
    Reduces risk by limiting permissions.
    Used in databases, operating systems, and cloud services.
                                                  Page 6 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                                  Page 7 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                               UNIT III
Secure Network Design
  1. *Explain the Cisco Hierarchical Internetworking model.
       o Definition: A structured approach to designing scalable and reliable
          networks.
       o Three Layers:
              Core Layer: High-speed backbone to ensure fast data transport.
              Distribution Layer: Policy-based connectivity, routing, and filtering.
              Access Layer: Connects end devices like computers and phones.
       o Diagram: Recommended to illustrate the three-layer model.
  2. Explain network availability and security.
       o Network Availability: Ensures continuous operation with minimal
          downtime.
              Redundancy, load balancing, failover mechanisms.
       o Network Security: Protects network infrastructure and data.
              Firewalls, encryption, access controls, intrusion detection.
                                                  Page 8 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
Firewalls
 9. *Explain the features of a firewall.
        o Traffic Filtering: Blocks unauthorized access.
        o Intrusion Prevention: Detects and blocks attacks.
        o Logging & Monitoring: Records network activity.
        o Types: Packet-filtering, Stateful Inspection, Next-Gen Firewalls.
 10. Explain strengths and weaknesses of a firewall.
    Strengths: Controls access, prevents cyber threats, logs activity.
    Weaknesses: Cannot prevent internal threats, misconfiguration risks.
 11. *Write a short note on different generations of firewalls.
    First Gen: Packet-filtering firewalls.
    Second Gen: Stateful inspection firewalls.
    Third Gen: Application layer firewalls.
    Next-Gen: Integrated threat intelligence and deep packet inspection.
 12. Write a short note on outbound filtering.
    Prevents unauthorized outbound traffic, reducing malware communication.
    Used to stop data leaks and malicious activities.
 13. *Write a short note on DMZ networks.
    Demilitarized Zone (DMZ): A subnet isolating public-facing services from the
     internal network.
    Protects sensitive data by restricting external access.
                                                  Page 9 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                      UNIT IV
Intrusion Detection and Prevention Systems
   1. *Explain Intrusion Defense System (IDS) types and detection models.
         o Definition: IDS monitors network/system activities for malicious behavior.
         o Types:
               Network-based IDS (NIDS): Monitors traffic across networks.
               Host-based IDS (HIDS): Installed on individual devices to detect
                 threats.
         o Detection Models:
               Signature-based: Identifies threats based on known attack
                 patterns.
               Anomaly-based: Detects unusual behavior.
               Hybrid: Combines multiple approaches for better accuracy.
         o Preventive Measures: Regular updates, integrating with SIEM, machine
           learning models.
   2. *Write a short note on Security Information and Event Management
      (SIEM).
         o Definition: A framework for real-time security monitoring and
                                                    Page 11 of 18
                                YouTube - Abhay More | Telegram - abhay_more
      607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
           management.
        o Features:
               Log management and correlation
               Real-time analysis of security alerts
               Incident response automation
        o Examples: Splunk, IBM QRadar, ArcSight.
        o Preventive Measures: Regular tuning, proper configuration, integration
           with IDS.
  3. List and explain steps to a successful IPS Deployment plan.
        o Definition: IPS (Intrusion Prevention System) actively blocks threats.
        o Deployment Steps:
               Assess security needs and risks.
               Choose the right IPS type (Network/Host-based).
               Configure policies and rules.
               Conduct testing and fine-tuning.
               Implement continuous monitoring and updates.
  4. *Explain different types of IDS Generation.
        o Definition: IDS detects threats using different approaches.
        o Types:
               Prevention-based (Active IDS): Responds automatically.
               Detection-based (Passive IDS): Alerts administrators without
                 taking action.
        o Preventive Measures: Regular updates, AI-driven analytics.
  6. *Write a short note on Private Branch Exchange (PBX) and its security
     measures.
       o Definition: A private telephone network for internal and external
          communication.
       o Features: Call forwarding, voicemail, conferencing.
       o Common Attacks: Eavesdropping, Toll Fraud, Denial of Service (DoS).
       o Security Measures: Strong authentication, encryption, firewall
          configurations.
                                                 Page 12 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                     BSC IT: SEM -VI SQA
                                                    Page 13 of 18
                                YouTube - Abhay More | Telegram - abhay_more
      607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                                 Page 14 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
                                        UNIT V
Virtual Machines and Cloud Computing
   1. *Define Virtual Machine and Explain Hypervisor Management
         o Definition: A Virtual Machine (VM) is a software-based emulation of a
            physical computer.
         o Hypervisor Management:
                A hypervisor is responsible for managing guest OS installations on
                  a VM server.
                It allocates resources (CPU, RAM, Storage) dynamically.
                Types: Type-1 (Bare-metal) and Type-2 (Hosted).
                Ensures isolation between VMs.
   2. *What is Cloud Computing? Explain Types of Cloud Services
         o Definition: Cloud computing enables on-demand access to computing
            resources over the internet.
         o Types of Cloud Services:
                IaaS (Infrastructure as a Service) - Provides virtualized computing
                  resources.
                PaaS (Platform as a Service) - Offers development platforms and
                  environments.
                SaaS (Software as a Service) - Delivers applications over the
                  internet.
   3. Explain How to Protect Guest OS, Virtual Storage, and Virtual Networks
      in Virtual Machines
         o Guest OS:
                Apply regular security patches.
                Use strong authentication and access control.
         o Virtual Storage:
                Encrypt stored data.
                Implement access control policies.
         o Virtual Networks:
                Use firewalls and network segmentation.
                Monitor traffic for anomalies.
   4. *What is a Hypervisor? How to Protect It?
         o Definition: A hypervisor is a software layer that enables virtualization.
         o Protection Measures:
                Secure boot mechanisms.
                Regular updates and patches.
                Restricted administrative access.
                                                 Page 15 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                     BSC IT: SEM -VI SQA
Physical Security
 11. *Explain Classification of Corporate Physical Assets
       o Types:
              Tangible (Computers, Servers, Office Equipment)
              Intangible (Data, Intellectual Property)
              Human Resources
       o Security Measures:
              Surveillance systems
              Controlled access zones
 12. *Explain Locks and Entry Controls for Securing Assets
       o Types of Locks:
              Mechanical locks (Deadbolts, Padlocks)
              Electronic locks (RFID, Biometric locks)
       o Entry Controls:
              Smart card access
              Two-factor authentication for high-security areas
 13. Explain Criteria for Choosing Site Location for Security
       o Factors to Consider:
              Geographical stability (away from flood zones, earthquakes, etc.)
              Proximity to law enforcement and emergency services
              Access control feasibility
              Surveillance coverage potential
              Environmental risks assessment
                                                 Page 17 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
 MORE ACADEMY                                                                  BSC IT: SEM -VI SQA
Securing Assets
 14. *Explain Factors for Securing Assets with Physical Security Devices
       o Perimeter Security: Fences, Gates, Security Guards
       o Surveillance: CCTV Cameras, Motion Sensors
       o Alarm Systems: Intrusion detection and real-time alerts
 15. *Explain Various Application Patching Mechanisms and Importance
       o Importance:
              Fixes security vulnerabilities.
              Enhances software functionality.
       o Mechanisms:
              Automatic Updates
              Manual Patching
              Rolling Updates (zero downtime)
 16. *Give the Benefits of Cloud Computing Security Services
       o Benefits:
              Scalable security solutions.
              Centralized threat monitoring.
              Data encryption and secure backups.
 17. *Explain General Types of Attacks in Web Applications
       o Types:
              Injection Attacks (SQL, Command Injection)
              Cross-Site Scripting (XSS)
              Cross-Site Request Forgery (CSRF)
              Distributed Denial of Service (DDoS)
       o Mitigation:
              Secure coding practices
              Web Application Firewalls (WAF)
              Regular security audits
 18. *Explain Two Confidentiality Risks in Cloud Computing and Their
     Remediation
       o Risks:
              Data Breaches: Encrypt data at rest and in transit.
              Unauthorized Access: Implement strong identity management.
                                                 Page 18 of 18
                             YouTube - Abhay More | Telegram - abhay_more
   607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622