Escolar Documentos
Profissional Documentos
Cultura Documentos
2
8
2
8
2.
3.
a. How do you define Computer Security?
2
b. Write about security services.
4.
a. Define Vulnerability and Threat.
2
b. Write about various types of attacks.
8
5. How the following attacks are executed?
3+3+4
a. Session Hijacking
b. MITM attack
c. Cross Site Scripting (XSS)
6.
a. How SQL injection attack is executed.
8
b. List at least 3 websites that are vulnerable to SQL injection attack.
2