Identify two strong passwords from the following list of passwords which meet the password creation guidelines.
VuLhr001#
vulahore
123456
MulCamp$001
ISBPak
(2)
What can be the applications that are difficult to prototype in your opinion? Mention any two. (2)
Identify at least two natural threats that can be faced by any information system. (2)
Identify and list at least two types of change relevant to change management.(2)
Which management style is appropriate when, "manager tells staff what to do and makes the final decision"? Justify your answer with at least one proper reason.(3)
A company's executive management wants to devise or modify security controls. Identify at least three factors which help to take decision for devising or modifying security controls. (3)
How does audit trails and logs help in risk management? Identify at least two ways.(3)
Why do people resist change or modification in running enterprise resource planning application? Give at least three reasons. (3)
You are working as a network manager in an internet company, customers of this company are complaining about viruses and other attacks at least five precautions which should be considered while using internet (5)
As an IT manager company and your task is to conduct security program. In your point of view, what should be the main components of the project security plan? State any five. (5)
Intrusion detection system identify nad give five logics (5)
1 question is more tell about the hirarchical and flat system organization (5)
40 number objectives from book not past papers
You received this message because you are subscribed to the Google Groups "Vu and Company" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vu-and-company+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
No comments:
Post a Comment