IT SECURITY-Recollected Q(20/01/2019)
1-Trapdoor
2-Botnet
3-access privilege
4-logical security
5-audit trail
6-rfid
7-issm
8-nsp and isp are generally called?
9-sniffer
10-one qus from RTI
11-whitebox testing
12-beta testing
13-ciso
14-threat/vunerbility
15-BIA
16-Risk=probabilty*damage potential
17-ISMS
18-Risk control
19-ISO270001
20-it governace how related to security governance
21-KRA
22-GPRS
23-Trojan horse
24-shema
25-CCTV which type control
26-best way to protect atm fraud
27-e-waste
28-what type fire extingure used in compter and electrical equip..
29-bar code
30-why matrix code used over bar code
31-intrusion prevention
32-one question related to security perimeter
33-BIG Data
34-BYOD which type risk
35-HP open view software
36-load balancing
37-inteligent device used in network-Router
38-switch-forwards mac add
39-mpls
40-vsat
41-air gaps
42-off the shelf software
43-adware
44-one qustion (arrange testing)unit/uat/beta..
45-salami technique
46-a major threat that faces telecom industry-eaves dropping
47-CDR
48-one ques from bpo
49-SDLC
50-ISO/IEC 90003:2004 (2 ques)
51-PDCA
52-SOX
53-PCI DSS
54-SAS 70
55-ATM related ( small camera are placed whic has capability of transmission)
56-how RFID (rj45 with visible external cabeling)
57-defense in depth (2 question)
58-what to do to receive govt green certificate like this..
59-tunneling
60-one ques from sensor base lighting ( light on only when movement)
61-one ques related to RDBMS
62-CVV
63-why rupay by npci( to compete with visa and mastercard)
64-audit control
65-tcp ip layers
66-NAT
67-smtp
68-dmz
69-unified threat management
70-SIEM
71-VOIP
72-IP SEC
73-COTS
74-IaaS
75-payper click
76-buffer overflow
77-stuxnet
78-one ques related to cyber terrorism
79-spyware
80-one ques related to rootkit
81-one ques related to high availabilty
82-latency
83-recovery block
84-dual core
85-2 ques related to rpo/rto
86-edp
87-check list bast audit, whts demerit ?
88-comparision ( audit through computer/audit with computer)
89-insurance-IRDA
90-FSDC
91-UCC/2007
92-CDR
93-pension form regulatory manged by ?94- digital signature replaced by?
IT security exam was of moderate level.
The questions were asked from.
OSI model, IP spoofing, IS audit methodologies, threat management, Software security control, Business continuity plan, Salami technique, access privilege and some case studies questions from various topics.
Shared By :Aravind
1-Trapdoor
2-Botnet
3-access privilege
4-logical security
5-audit trail
6-rfid
7-issm
8-nsp and isp are generally called?
9-sniffer
10-one qus from RTI
11-whitebox testing
12-beta testing
13-ciso
14-threat/vunerbility
15-BIA
16-Risk=probabilty*damage potential
17-ISMS
18-Risk control
19-ISO270001
20-it governace how related to security governance
21-KRA
22-GPRS
23-Trojan horse
24-shema
25-CCTV which type control
26-best way to protect atm fraud
27-e-waste
28-what type fire extingure used in compter and electrical equip..
29-bar code
30-why matrix code used over bar code
31-intrusion prevention
32-one question related to security perimeter
33-BIG Data
34-BYOD which type risk
35-HP open view software
36-load balancing
37-inteligent device used in network-Router
38-switch-forwards mac add
39-mpls
40-vsat
41-air gaps
42-off the shelf software
43-adware
44-one qustion (arrange testing)unit/uat/beta..
45-salami technique
46-a major threat that faces telecom industry-eaves dropping
47-CDR
48-one ques from bpo
49-SDLC
50-ISO/IEC 90003:2004 (2 ques)
51-PDCA
52-SOX
53-PCI DSS
54-SAS 70
55-ATM related ( small camera are placed whic has capability of transmission)
56-how RFID (rj45 with visible external cabeling)
57-defense in depth (2 question)
58-what to do to receive govt green certificate like this..
59-tunneling
60-one ques from sensor base lighting ( light on only when movement)
61-one ques related to RDBMS
62-CVV
63-why rupay by npci( to compete with visa and mastercard)
64-audit control
65-tcp ip layers
66-NAT
67-smtp
68-dmz
69-unified threat management
70-SIEM
71-VOIP
72-IP SEC
73-COTS
74-IaaS
75-payper click
76-buffer overflow
77-stuxnet
78-one ques related to cyber terrorism
79-spyware
80-one ques related to rootkit
81-one ques related to high availabilty
82-latency
83-recovery block
84-dual core
85-2 ques related to rpo/rto
86-edp
87-check list bast audit, whts demerit ?
88-comparision ( audit through computer/audit with computer)
89-insurance-IRDA
90-FSDC
91-UCC/2007
92-CDR
93-pension form regulatory manged by ?94- digital signature replaced by?
IT security exam was of moderate level.
The questions were asked from.
OSI model, IP spoofing, IS audit methodologies, threat management, Software security control, Business continuity plan, Salami technique, access privilege and some case studies questions from various topics.
Shared By :Aravind
No comments:
Post a Comment