VND - Openxmlformats Officedocument - Wordprocessingml.document&rendition 1 1
VND - Openxmlformats Officedocument - Wordprocessingml.document&rendition 1 1
Explain what social engineering is and give one example of a social engineering
attack.[U]
Define insider threat and give one example of how an insider could pose a threat
to network security.[R]
“You are advising a startup company on securing their IoT devices, which are
susceptible to vulnerabilities such as weak authentication and insecure
communication protocols.Recommend security measures to mitigate these IoT-
specific vulnerabilities”.[Ap]
UNIT –II
Explain how IPSec protocol helps in protecting data during communication with
its
components [U]
Compare and contrast the roles of SSL and TLS in securing online
communications.
Identify the role of SSH (Secure Shell) in securing remote access to servers and
network
State the challenges and considerations organizations may face when seeking
ISO/IEC 27001 certification. What strategies can be employed to overcome these
challenges and achieve successful certification?[R]
UNIT III
Name two common firewall deployment architectures and briefly explain their
differences.[R]
Identify which type of firewall is suitable for the given scenario: “A small
business wants to secure its internal network from external threats while allowing
basic internet browsing and email”.[AP]
Explain how does IDS differ from Intrusion Prevention Systems (IPS)?[U]
Identify and describe the approach to deploying and managing the stateful filter
firewall,emphasizing the specific challenges and considerations relevant to
safeguarding e-commerce operations.[Ap]Define Intrusion Detection System
(IDS)[R]
What does VPN stand for, and what is its primary purpose?[R]
Identify the differences between the perimeter and internal network security.[R]
Describe the concept of Zero Trust Architecture and its application in securing
internal network communication.[U]
Compare and contrast the use of encryption for data-at-rest and data-in-transit.
[An]
Define Network Address Translation (NAT) [R]
Use the following scenario to describe the measures that you put in place to
securely enable remote access, and how would these measures protect the internal
network?“Your organization needs to allow remote employees to securely access
internal resources. You need to ensure that this access does not expose the
internal network to external threats”.[An]
Recall the techniques used to secure the network communication for your
organization when it needs to allow remote employees to securely access internal
resources. You need to ensure that this access does not expose the internal
network to external threats [R] .
UNIT IV
State the two defensive strategies that organizations can implement to mitigate
the risk of APT attacks.[R]
Classify the steps that you take to respond to the following potential APT
attempt-“You are the Chief Information Security Officer (CISO) of a large
corporation. You receive an alert that an employee has received a suspicious
email that contains a link claiming to be from a well-known cloud service
provider requesting a password reset”. [AP]
Your organization has been experiencing targeted attacks, and you suspect that an
APT group might be involved. As part of your defense strategy, you decide to
implement network segmentation. Describe how you would go about this and explain
how it can help in mitigating APT risks.[AP]
Analyze how the core principles of Zero Trust Architecture—never trust, always
verify, and least privilege—affect the management of user access and network
security.[AN]
Define the Protect Surface Implement Strong Identity and Access Management
(IAM)[R]
Explain the differences between phishing, spear phishing, and whaling. Include
key characteristics that distinguish each type.[R]
Define the Endpoint Protection Software and Data Encryption security.[R]
Discuss about Phishing and Fraud Detection and Vulnerability Management.[U]
Explain Automated Response and Predictive Analytic in network defense.[U]
Explain any 4 strategies of zero trust architecture.[U]
Imagine you are tasked with implementing an AI-based Intrusion Detection
System (IDS) for a large organization. Describe how you would leverage AI to
improve the IDS's effectiveness. Include specific AI techniques you would use and
how they would enhance detection capabilities.[AP]
Your organization has recently expanded its operations and is handling a large
volume of critical data. How would you design a data backup strategy to ensure the
integrity and availability of this data? Include considerations for backup frequency,
storage solutions, and recovery procedures.[Ap]
Relate the three specific techniques used by AI to enhance email filtering and
provide examples of how these techniques improve user experience.[AN]
Analyse the steps to create a strong security framework for protecting your
endpoints from various types of cyber threats.[AN]
UNIT V
[R]
[U]
[R]
[U]
Explain the key actions involved in the 'Identification' phase of incident response
and their significance.
Discuss are the key components of the 'Lessons Learned' phase in incident
response, and why is this phase crucial?
[App]
Sketch the key steps involved in the 'Detection and Analysis' phase of incident
response and explain their significance.
Use which network forensic tools would you use to analyze the suspicious
network traffic, and what specific actions would you take to identify potential data
exfiltration?
Use which log management tools would you use to investigate the breach, and
what steps would you take to analyze the logs for evidence of unauthorized access?
Analyse the steps to show how can an organization use the findings from a
forensic investigation to enhance its overall security posture?
[R]
Recall the key features and uses of forensic tools in digital investigations
{u]
.Discuss the key legal considerations that organizations must address when
handling data breaches and conducting forensic investigations.
Discuss the examples of how the legal considerations impact the process of
managing and investigating breaches.
Describe the various steps involved in incident response.
[Ap]
You are the IT Security Manager at a mid-sized company. The company’s
network has been compromised by a ransomware attack that has encrypted
several critical files and displayed a ransom note on affected systems. Write the
steps you would take to respond to this incident.
Your company suspects a data exfiltration attempt due to a sudden increase in
outbound traffic. How would you approach the investigation using forensic tools
and techniques? Illustrate your investigative process and the tools you would use.
{AN]
Examine the steps you would take to respond to the following data breach as the
Incident Response Manager.”Your organization has suffered a data breach after
several employees fell victim to a phishing attack, leading to the compromise of
sensitive customer data”.
A major data breach has occurred, and sensitive customer data has been leaked.
As a forensic investigator, identify the steps you would take to analyze the breach
and identify how the data was compromised.