Unit4 - Subjective Questions

INT242 • Practice Questions with Detailed Answers

1

Define Network Security Baselines. Explain why they are critical for an organization's security posture and list three common elements included in a baseline configuration.

2

Differentiate between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) within the context of network security capability enhancement.

3

Describe the concept of Endpoint Detection and Response (EDR). How does it differ from traditional antivirus software?

4

Discuss the security risks associated with BYOD (Bring Your Own Device) policies and explain how Mobile Device Management (MDM) can mitigate these risks.

5

Explain Mobile Device Hardening. List five specific techniques used to harden a mobile operating system.

6

Compare HTTP and HTTPS regarding Application Protocol Security Baselines. Explain the mechanism HTTPS uses to secure communication.

7

What is the OWASP Top 10? Explain SQL Injection (SQLi) and how it can be prevented in web applications.

8

Analyze the Shared Responsibility Model in Cloud Security. Who is responsible for security in IaaS, PaaS, and SaaS models?

9

Explain the significance of SSH (Secure Shell) over Telnet for remote management as part of application protocol security baselines.

10

Define Cross-Site Scripting (XSS). Describe the difference between Stored XSS and Reflected XSS.

11

What is a SIEM (Security Information and Event Management) system? How does it enhance network security capabilities?

12

Describe the principle of Defense in Depth when implementing endpoint security.

13

Explain the concept of Network Segmentation and its role in enhancing network security.

14

Discuss the security risks associated with Jailbreaking (iOS) or Rooting (Android) on mobile devices.

15

In the context of Cloud Application Security, what is a Cloud Access Security Broker (CASB) and what are its four pillars?

16

Explain the importance of Patch Management in endpoint security implementation. Describe the typical patch management lifecycle.

17

Derive the difference between Symmetric and Asymmetric encryption as used in secure application protocols (like SSL/TLS).

18

What is Cross-Site Request Forgery (CSRF)? How does it impact web application security and what is a common mitigation technique?

19

Describe Network Access Control (NAC). How does it enhance security for devices connecting to the network?

20

Explain the security implications of Serverless Computing in cloud environments. What are the specific security challenges?