Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
61 views2 pages

2022 Fundamentals of Computer Security

Uploaded by

sharmalalit0777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views2 pages

2022 Fundamentals of Computer Security

Uploaded by

sharmalalit0777
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Post Graduate Diploma in Cyber Security and Law

Semester I Examination (March-April, 2022)


Paper no – 1
Paper Code - 92911101
THEORY EXAM – March 30th, 2022
Subject – Fundamentals of Computer Security

Duration: 2 Hours Max. Marks: 40


General Instructions:
All questions carry equal marks. Answer any FOUR questions. Upload your answers in PDF format
(in one pdf file, preferably):

Q1. In your own words, explain with examples, what you understand by Confidentiality, Integrity
and Availability (CIA) triad in cyber security. Explain one or two common attacks that target each
these issues of confidentiality, integrity and availability and the counter measures which one can
take for securing against such threats. (briefly, in about 400 words) 10 Marks

Q2. Attackers take advantage of vulnerabilities of the web server, web applications and TCP/IP
network implementations. A full stack developer has to understand daily tradeoffs between
security, practicality and speed. You have studied server-side and client side scripting languages
such as Python, PHP, HTML, CSS, etc. What are some basic measures which one can take while
developing, implementing and using such apps to ensure the security of the web application and
the associated data? 10 Marks

Q3. The Information Technology Act has served to be an important piece of legislation. In not more
than 400 words, give an overview of its salient features that would enable us to understand the
significant contribution it has made in terms of helping our nation keep pace with the changing
needs of the times. Give some important steps taken by the Government of India (very briefly) for
cybersecurity and for the protection of the critical infrastructure of the country? 10 Marks

Q4. Explain in your own words, the factors which led to the development of Unicode. Explain and
compare the UTF-8, UTF-16 and UTF-32 encoding schemes. What are the advantages and
disadvantages of Unicode? Explain what is ‘punycode’ and where it is used. 10 Marks

(Contd….)
Q5. Generally, an operating system comprises of number of pieces such as the Boot loader, the
Kernel (includes memory management), Processes and Daemons, File Systems, Shell, Desktop
environment (GUI), CLI, applications, auditing and logging, configurations, etc. Using your
understanding of the Linux operating system, what steps can you take to secure your Linux OS? In
your opinion, is Linux inherently more secure than other OSes? Why, or why not? 10 Marks

Q6. After your graduation, you have just joined an organization as a cyber-security expert. Your
boss wants you to develop a set of security guidelines and policies which will continue to ensure
the prosperity of the company. Prepare a document (nearly 400 words) detailing all the risk
elements (hardware and network, software, data and information) and how you will develop
guidelines to secure these elements. (e.g. use of web, email system, VPN, firewalls, anti-virus,
incident management, etc.) 10 Marks

You might also like