Unit1 - Subjective Questions

INT242 • Practice Questions with Detailed Answers

1

Explain the CIA Triad in the context of information security. Provide an example for each component.

2

Differentiate between Authentication, Authorization, and Accounting (The AAA Framework).

3

Describe the three main categories of Security Controls with examples.

4

Compare Symmetric and Asymmetric encryption techniques. List at least three differences.

5

Define Social Engineering. Explain Phishing, Vishing, and Pretexting.

6

What is an Attack Surface? Distinguish between the Network Attack Surface and the Human Attack Surface.

7

Explain the concept of Hashing. How is it different from Encryption?

8

Analyze the different types of Threat Actors based on their motivation and capability.

9

Describe the Public Key Infrastructure (PKI) and the role of the Certificate Authority (CA).

10

Explain the process of creating and verifying a Digital Signature to ensure non-repudiation.

11

Define Defense in Depth and explain why it is a critical security strategy.

12

Discuss the mathematical relationship in RSA Algorithm key generation. Use LaTeX for equations.

13

What is Steganography? How does it differ from Cryptography?

14

Explain the significance of Salting in password storage.

15

What is a Digital Certificate? Describe the X.509 standard structure.

16

Describe the Zero Trust security model.

17

Differentiate between Spear Phishing and Whaling.

18

Explain the operation of a Man-in-the-Middle (MitM) attack.

19

What are Cryptographic Hash Functions? List three properties they must satisfy.

20

Describe the Key Distribution Problem in Symmetric Cryptography and how Asymmetric Cryptography solves it.