1- Define cloud computing?
2- What differentiate a rule based firewall from application aware firewall or next generation firewall?
3- Explain the difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS)?
4- T/F Cloud computing is less secure . explain your reasoning to the above question?
5- What are some of the reasons that would make an organization opt for a Hybrid cloud instead of pure public or private cloud.
6- What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?
* operating system.
7- Using illustration explain the meaning of single sing on (SSO)?
8- 1- Define in details sensitivity labels as used in a secure system that use mandatory access control (MAC) for access control?
2- What is the difference between War Driving and War chalking?
3- Explain in detail how the DNS work when a new device is added to domain and the user need to access a new external website. This will require clear demonstration and explanation of how various components of DNS work including the role of the DNS cache. Host file TLD.
Local DNS est)?
4- Define the concept of least privilege as it relates to access control?
5- use illustration to describe the following components of a Blue tooth network topology?
• Master/slave.
• Piconet .
• Scatternet
• Actine slave
• Parked slave
6- what is the difference between open ID and open Auth( oauth)?
9- Switch /2
HUP/1
IP/4
TCP/4
FTP/4
UDP/4
HTTP/7
10- Use illustration to describe how a network proxy work?
11- What do you get from a cloud provider when you sing up for a platform as a service (Paas) cloud computing model?
• Custom Application
• Storage
• Hardware
• Operating.
12- In access control which one of the following falls in the category of something you are?
• Password
• Token
• Cellphone
• Fingerprint.
13- What is the difference between bluejacking and Bluesnarfine Bluetooth attack?
14- In wireless network what does SSID stand for?
15- An unauthorized wireless Access point plugged in a corporate network is known as?
• Rogue Access point.
• Evil Twin
• Malicious wireless point (MWP)
• Malicious Access point (MAP)
16- T/F MAC address Filtering is a proven way of securing wireless network?
17- T/f Disabling wireless SSID keep your network hidden hence protecting your wireless network ?
18- In wireless network what dose WEp stand for?
19- List 2 security setup that can help secure mobile devices?
20- Define the following Access control Terminology?
• Object:
• Subject
21- T/F in Discretionary access control model (DAC) the system's owner set Access rights and permissions?
22- What is the difference between separation of duties and Job rotation? Why is each important?