Subjecive Question Cyber Security
Subjecive Question Cyber Security
Subjecive Question Cyber Security
Cyber Security
1. Write down the art of security breach?
Ans. (a) Mind Set
(b) Serendipity
(c) The Tempest re-written
(d) Mission Possible
(e) The Beast and Beauty
(f) Power is Powerless
(g) Watch Your Traffic
(h) Where Angles Fear to Tread
(i) www.domain.com
(ii) domain.com
(i) www.domain.com
3. What is the procedure used for making web site in ms front page?
4. What are the points born in your mind when backing up website?
5. Write down the facility of CMS.
Feature of CMS.
(a) Empower non-technical staff and facility to write, edit, and manage Web
content.
(b) Publish information to public-facing Web sites, format information for alternate
viewers such as cell phones and wireless devices.
(c) Dynamically update Web sites.
(d) Provide a centralized set of Web products that everyone can use.
(e) More easily safeguard data.
(f) Achieve a consistent look-and-feel.
(e) Monitor and regulate all incoming and outgoing Internet users.
(g) Provide the user with information about an application that makes a
connection attempt.
(h) Provide information about the destination server with which an application is
attempting to communicate.
Types of Firewall
(b) In Server Manager scroll down to Roles Summary, and click on Add Roles
(c) The Add Roles Wizard starts at this point and warns you that if you are going to add
a role to make sure:-
(e) The next page will give you some basic information on IIS Web Servers and a few
links with extra information if needed. Click on the Next button to continue.
(f) The next window is the Select Role Services. This very important screen will allow
you to add only the modules necessary for your planned installation of IIS.
(g) Click Next button to get to the Confirm Installation Selections screen to verify your
chosen settings.
20. When problem comes on Mouse and Key Board then what point should be adopted?
(i) Make sure that mouse cable is correctly connected to its port.
(ii) Turn your PC’s system unit power off and back on and see if the error
disappears.
(iii) If you have a second mouse available, turn off your PC’s power and connect
the new mouse. Power the PC back on to see if the error disappears.
(iv) Try the mouse on some other system where a mouse of the same type is
known to support the mouse.
(v) Some software do not support mouse.
(vi) Make sure the mouse device driver being used is correct one and is setup
correctly.
(vii) If the mouse is a serial mouse, try using a second serial port. You might
need to update the mouse device driver to use the second serial port.
(viii) If you are using a bus mouse, make sure that the mouse adapter card is
properly seated in its expansion slot.
Key board
(a) When the keyboard of a system is not working then some of the
points that must be checked are.
(b) Some old keyboards have a small switch at their bottom side to select the
operating mode of the keyboard. Using this switch one can select either XT(8088/8086)
or AT (80286) operating mode.
(c) If this switch is in the wrong position then the keyboard will not
function and this will generate a POST error msg during the system
starting time.
(d) Many old computer have a keyboard lock on the front panel. This
lock disable the keyboard. Forgetting to unlock this lock, or not properly
unlocking this could be one reason of the keyboard not working.
21. When a paper jamming in the printer what are the main points would be adopted?
(a) Paper quality poor. Ensure that the paper you introduce into
your printer meets with the standards of the printer manufacturer and replace if
necessary.
(b) Obstruction along paper path. There might be something caught
along the paper path.
(c) Sensors faulty. Faulty sensors along the paper path will not provide the
printer with the correct information about the paper’s position in the printer and hence the
printer will fall into a false paper jam mode.
(d) Tractors Worn out.
(i) For printers that use tractor fed paper. The tractors may be worn out
and can be out of alignment with one another.
(ii) Observe the tractors as they feed paper. A good way to test this
is to form feed multiple sheets or paper and see what happens.
(iii) If the tractors require replacement, always replace both the
LHS and RHS Tractors at the same time.
(e) Main logic board is faulty.
(i) In some cases, the main logic board could be the cause of
going into a false paper jam alarm mode.
(ii) Repair or replace the main logic board
22. What are the network components and its purpose.
In a network, the communication between two computers occurs in the form of signals. The
data from a source computer is converted into signals and transmitted to the destination
computer. On the destination computer, these signals are converted back to data. To connect
two computers in a network, you need certain hardware and software components. The
components used for networking include:-
(a) Hardware components:-
(i) Network Interface Controller (NIC) card
(ii) Cables
(iii) HUB
(iv) Switch
(v) Router
(vi) Repeater
(vii) Gateway
(viii) Bridge
(ix) Connectors
Types of HUBS.
(a) Active Hubs. An active hub is usually powered and it amplifies the signal
to its original strength. Active hubs are the most common type of hubs used in
Networks. They are useful when the segments of the networks are not close to one
another and the signal may require amplification.
(b) Passive Hubs. A passive hub is typically unpowered and makes only physical
electrical connections. It does not regenerate or amplify the signal.
(c) Hybrid Hubs. Advanced hubs that will accommodate several different types
of cables are called hybrid hubs.
Routers. A router is a device used to connect two networks using same or different
protocols. Routers operate at the Network layer of the OSI reference model. It uses the network
addresses for filtering and forwarding information to different networks. A network address is
the address of the computer on a network. Routers store the network addresses of computers
in different networks in a table, called the routing table. In addition to the network addresses,
the routing table also contains information on the path that should be used to transmit data,
and any rules that have been defined for filtering network traffic
Switches. In a network, a switch acts as a central point for various devices such as
computers, printers, and routers. Switch work at the Data link layer of OSI reference model.
When the data frame is sent using a switch, the data frame carries the address of the
destination computer with it. The data frame contains the MAC address of the destination
computer. Switches can read this MAC address, and as a result, data is forwarded only to be
intended computer rather than being forwarded to each computer on the network. As a result,
switch reduces network traffic and therefore enhances the network performance
Covers a local area of 1 km. Covers larger area than LAN but Spans large geographical area more
smaller than WAN with an area of 2 than 100 km.
to 100 km.
Data Transmission Rate – 10/100 Data Transmission Rate – Variable Data Transmission Rate – 64 Kbps
Mbps or 2 Mbps
Uses IEEE 802 standard Uses IEEE 802 standard Uses ITU standard
Mesh Topology In mesh topology there are at least two paths to and from
every node. Unlike each of the previous topologies, messages sent on a mesh
network can take any of several possible paths from source to destination. (Recall
that even in a ring, although two cable paths exist, messages can only travel in one
direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh
network in which every device connects to every other device is called a full mesh. As
shown in the illustration below, partial mesh networks can also be setup in which
some devices connect only indirectly to others.
(a) Advantages of Mesh topology is the multiple redundant paths exist between
nodes.
(b) Disadvantages of Mesh topology are; it requires more cable than the other
LAN topologies and its implementation is complicated
28. What you mean by Server based network and Peer to Peer network?
Server-Based Network. In a server-based network, a server controls access to some
resource (such as a hard disk or printer) and serves as a host for the workstations connected
to the server. A workstation requests services, such as access to files or programs on the
hard disk or use of a printer, from a server. Servers run the Network Operating System (NOS)
software; workstations run client software that manages the communication between the
workstation and the network.
Peer to Peer Network In a peer-to-peer network, there are no dedicated servers or
hierarchy among the computers. All of the computers are equal and therefore are known as
peers. Normally, each computer functions as both a client and a server, and there is no one
assigned to be an administrator responsible for the entire network. Peer-to-peer networks are
also called workgroups. The term workgroup implies a small group of people. In a peer-to-
peer network, there are typically fewer than 10 computers in the network. Peer-to-peer
networks are relatively simple. This network can be less expensive than server based
networks.
29. Define disadvantage of Server based network.
Disadvantages of Server Based Network. Server based networks have some
disadvantages as follows:-
(a) Expensive dedicated hardware.
(b) Expensive network operating system software and client licenses.
(c) A dedicated network administrator usually required
30. What is protocol, common network protocol and define any one.
Protocols. A protocol is a set of rules that governs the format & meaning of
frames, packets or messages exchanged by peer entities within a layer. These rules
include guidelines that regulate the following characteristics of a network:-
(a) Access method.
(b) Allowed physical topologies.
(c) Types of cabling.
(d) Speed of data transfer.
Entities use protocols to implement svc definitions.
Common Networking Protocols.
(a) TCP/IP.
(b) NetBEUI.
(c) IPX/SPX.
(d) NW Link.
(e) Apple Talk.
(f) DLC.
Apple Talk
Apple Talk allows your Windows NT server to communicate with Macintoshes on your
network. If you install Services for Macintosh, you will be able to serve Windows NT files and
printers to your Mac users.
By default, the Routing and Remote Access service (RAS) is installed automatically
during the Windows Server 2003 installation.
(a) To Enable the Routing and Remote Access Service :-
(ii) Right-click the server, and then click Configure and Enable RAS to
start the RAS Setup Wizard. Click Next.
(v) On the VPN Connection page, click the network interface that is
connected to the Internet, and then click Next.
(ii) In the Start IP address box, type the first IP address in the range of
addresses that you want to use.
(iii) In the End IP address box, type the last IP address in the range.
Windows calculates the number of addresses automatically.
(vi) Accept the default setting of No, use RAS to authenticate connection
requests, and then click Next.
(vi) Click Finish to enable the Routing and Remote Access service and to
configure the remote access server.
35. Draw a diagram of architecture of Army internet and short brief on feature of army
internet.
Architecture of Army Intranet. Architecture of Army Intranet is shown in the figure below.
Di
v
Corp
s
Di Corp W
Btn/un v s C
it CC
Di NC
v
Btn/un
it Corp AHQ
(a) s
(b)
(c)
(d) TC EC
(e)
(f)
SW
(g)
C
(h) The main server is at Army HQ which is maintained by Army HQ Computer
Centre.
(i) All lower formations servers are connected to their respective higher formation
server and so on to the Army HQ server.
(j) The Army HQ web site IP address is 131.1.11.41 and its domain name is
http://portal.army.mil
(k) Same as Army web site, all web sites down to unit level have addresses.
(l) All commands web sites are linked to the Army web site, and Corps web sites
are linked to their command web and so on down to unit’s web sites. In addition,
important web sites links are also given in each formations web site.
(b) The problem of security of a computer and the data or information it may
contain, has received much publicity since it became apparent that a computer can
play a major role in processing and storing secret, private or proprietary information.
They can, therefore, possess tremendous capability for effective dissemination, and
thus sharing, or useful facts.
(c) Cyber security is concern about the computer, server, PC or any type
of data or information store which should be secure from virus, hacker, cracker, your
personal info about the particular subject. The cost of computer crimes totals about 500
billion rupees over the past five years.
(b) It will load and run without a request. To meet the minimum criteria for
computer virus design, a program must be executable, be capable of cloning
itself and converting other executable objects into viral clones. Hence, it may be a
simple DOS batch file.
Type of Computer viruses:
(a) Boot Sector Infectors (BSI)
(b) Command Processor Infectors (CPI)
(c) General Purpose Infectors (GPI)
(d) Multipurpose Infectors (MPI)
(e) File specific Infectors (FSI)
(f) Memory Resident Infectors (MRI).
39. When a Cyber auditor audits the PC which point should be important?
(a) Audit Criteria. Set of policies, procedures or requirement. Used as a ref
against which audit evidence is compared.
(b) Audit Evidence. Records, systematic of facts, or other info which are
relevant to audit criteria and is verifiable.
(c) Audit Findings. Result of evaluation of the collected audit
evidence against audit criteria.
(d) Audit Conclusions. Outcome of an audit provided by an audit
team after consideration of audit objectives and audit findings.
(e) Auditee. Organise being audited.
(f) Auditor. Pers with competence to conduct an audit.
(g) Audit scope. Extent and body of an audit general involves laying down
physical location, organize units, activities and processes as well as time
period covered.
40. What are the Types of Cyber Security audits and explain any one.
42. Write a Short note on IDS, Types of IDS and Brief about IPS?
it Is a device or software application that monitors network and/or
system activities for malicious activities or policy violations and produces reports to a
Management Station. Some systems may attempt to stop an intrusion attempt but this is neither
required nor expected of a monitoring system. Intrusion detection and prevention systems
(IDPS) are primarily focused on identifying possible incidents, logging information about them,
and reporting attempts. In addition, organizations use IDPSes for other purposes, such as
identifying problems with security policies, documenting existing threats, and deterring
individuals from violating security policies. IDPSes have become a necessary addition to the
security infrastructure of nearly every organization.
About IPS
IPS also known as Intrusion Detection and Prevention Systems (IDPS), are
network security appliances that monitor network and/or system activities for
malicious activity. The main functions of intrusion prevention systems are to
identify malicious activity, log information about said activity, attempt to
block/stop activity, and report activity.
43. What is the procedure used when we installing the Antivirus server?
(a) For installation on a 32-bit computer, in the root of the CD, run Setup.exe.
(b) In the Symantec Anti Virus panel, click Install button Symantec
AntiVirus>InstallSymantec Anti Virus.
(c) Installing Symantec Anti Virus servers 11 Installing Symantec Anti Virus
servers locally
(d) In the welcome panel, click Next button. In the License Agreement panel,
click I accept the terms in the license agreement, and then click Next button.
(e) In the Client Server Options panel, click Server, and then click Next button.