Question
Subject : Information Security Analysis & Audit (Each Question 10 Marks) Pls ans all the question Q1) In what way firewall provides security and how
Subject : Information Security Analysis & Audit (Each Question 10 Marks) Pls ans all the question
Q1) In what way firewall provides security and how far it works to different intruders and attackers? Explain the technical details of the firewall and describe the need for a firewall in VPN along with its types.
Q2) Cybercriminals who try to steal data and disrupt organizations look for the same systems that were under attack earlier. Do these organizations have enough and the right tools to uncover hidden threats? Explain any five system security tools that are widely used to protect the system.
Q3) Briefly explain the best practices that apply for any data backup. Highlight the common data backup solutions and storage considerations
Q4) An employee at a regional grocery retailer received an email from his co-worker, informing him that she was sharing a document with him. He had received documents from her before but wasn't expecting one that day. The email was vague and had no project details, which was unusual. He clicked the link, and it opened to what looked like the usual file-sharing site the company typically uses. He was asked to enter his login and password, then got an error message. He tried again and got another error message. The employee contacted his manager to request a password reset and report trouble downloading a shared document. He also mentioned that he called the co-worker, and she said she had not sent him anything. The manager was suspicious that this was likely a hacking incident. How does the manager assess or manage the incident and list the comprehensive plans, updates, or changes required in the working environment?
Q5) On a Tuesday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. The organization has already incurred widespread infections before antivirus signatures become available several hours after the worm started to spread. a) How would the incident response team keep the organization's users informed about the status of the incident? b) What additional measures would the team perform for hosts that are not currently connected to the network?
Q6) Audit planning covers all the major areas. The term audit is mainly coined to mirror the incidence of checking financial records of a business or individuals for accuracy. Discuss the activities that need to be reviewed and finalized before the actual audit.
Q7) Discuss how to develop and maintain professional relationships with others. How do you deal constructively with any conflict that may arise with colleagues?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started