Unit3 - Subjective Questions

INT249 • Practice Questions with Detailed Answers

1

Explain the concept of a Firewall and describe the differences between Packet Filtering and Stateful Inspection firewalls.

2

What is Server Hardening? List five essential techniques used to harden a Linux server.

3

Differentiate between HIDS (Host-based Intrusion Detection System) and NIDS (Network-based Intrusion Detection System).

4

Explain the CIA Triad as a fundamental model for information security.

5

Describe the Bell-LaPadula confidentiality model. Use mathematical notation to explain the 'Simple Security Property' and the '*-Property'.

6

Compare Discretionary Access Control (DAC) and Mandatory Access Control (MAC).

7

Explain the operation of SSH (Secure Shell) and how public key authentication works.

8

What is a DMZ (Demilitarized Zone) in network security? Draw a conceptual structure or describe its placement.

9

Explain the concept of Virtual Private Networks (VPNs) and the tunneling protocols IPSec and SSL/TLS.

10

Discuss Physical Security measures required for a server room.

11

What is Role-Based Access Control (RBAC)? How does it simplify administrative overhead compared to DAC?

12

Define VLANs (Virtual Local Area Networks) and explain their security benefits.

13

Explain the Biba Integrity Model. How does it differ from Bell-LaPadula?

14

What are Access Control Lists (ACLs) in the context of file system security? Provide an example of how they extend standard Linux permissions.

15

Describe Signature-based vs Anomaly-based intrusion detection methods.

16

What is the Principle of Least Privilege (PoLP) and why is it critical for Server Administration?

17

Explain the mechanics of a TLS Handshake. How does it establish a secure connection?

18

Discuss Network Segmentation as a method for securing a server environment.

19

What are Wrapper tools (like TCP Wrappers) and how do they function as an access control method?

20

Explain the concept of Defense in Depth regarding server security.