We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

Looking For Something at vustudents.ning.com? Click Here to Search

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More


Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

How to Add New Discussion in Study Group ? Step By Step Guide Click Here.

 

Question No.1                                                                                                                                2.5+2.5

 

Access Controls are implemented in any organization to increase the security. Type of access control vary according to situation and level of security needed. Two situations are given below and you have to identify the type of access control applied in each one of them.

 

A)    An organization wants each individual to provide some kind of distinctive physical characteristics to prove its identity. Without identification he/she will not be allowed to access different assets. (Physical + Logical)

B)    An organization is dealing with very critical information and it does not want its data to be disclosed to anyone especially during transmission. To avoid any exposure to intruders, organization wants to convert its data into secret code for the secure transmission over the public network.

Question No. 2                                                                                                                                         3

 

Different types of Computing Environments are used in different situations according to the requirements. Suppose a company wants high computing power and security along with flexibility, scalability and fault tolerance. For this purpose the company has deployed many computer systems at different locations and to do parallel computing.  In your point of view, which computing environment will be suitable in this set-up?

 

Question No. 3                                                                                                                                         2

 

Which parts of a computer system are most vulnerable when it is attacked by some virus? Write names of at least four (4) parts.

 

BEST OF LUCK

+ How to Follow the New Added Discussions at Your Mail Address?

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?


See Your Saved Posts Timeline

Views: 2302

.

+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)

Attachments:

Replies to This Discussion

koi working nahe hai par mention tu kero k distributed suit kyu kerta hai...a little like two lines...or three lines would go...mainay jawab diaa bhi hai detail may thura say chk tht out and i dont think so k khali naam mention kernay say you will get 3marks you have to explain and tell why u think it is suitable.! :)

thanks sister

Answer1:
Physical access control is basically an individually accessing machine, data physically and it has high risk of security therefore we use logical access control through which the access to machine or data is secured and used by the authorized person only. Organizations are using some methods in Logical control access. We can observe the methods below which are used by the organizations above.
a)Biometric method is used by the organization to secure the authorization

b)Cryptography method is used by the organization to secure the data and it can be decoded by the authorized person and can get to know the orignal text of the data through decrypting.

Answer 2 : Distributed environment is suitable as it fulfills the demand of the organization as it is a programme which focuses on designing distributed, open, scalable, transparent, fault tolerant system. 


Answer 3:
Attacking targets for viruses are which are most vulnerable:
1. Executable Program files
2. Data files
3. Boot and system areas
4. File Directory system.

Hope this helps more :) all the best JAzak ALLAH KHAIR!

Thanks for sharing.

Question No: 1

Access Controls are implemented in any organization to increase the security. Type of access control vary according to situation and level of security needed. Two situations are given below and you have to identify the type of access control applied in each one of them.

 

A)    An organization wants each individual to provide some kind of distinctive physical characteristics to prove its identity. Without identification he/she will not be allowed to access different assets. (Physical + Logical)

Answer:

For this purpose we use Biometrics systems.

Identification of an individual through unique physical characteristics is proving to be quite safe

and secure for allowing access. Biometrics can be defined as study of automated methods for

uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

Scope of Biometrics:

• Finger print

• Hand print

• Voice Print

• Facial profiling – measuring distance between various points on face

• Iris/retinal recognition – eye patterns

B)    An organization is dealing with very critical information and it does not want its data to be disclosed to anyone especially during transmission. To avoid any exposure to intruders, organization wants to convert its data into secret code for the secure transmission over the public network.

Answer:

Communications controls

Question No: 2

Different types of Computing Environments are used in different situations according to the requirements. Suppose a company wants high computing power and security along with flexibility, scalability and fault tolerance. For this purpose the company has deployed many computer systems at different locations and to do parallel computing.  In your point of view, which computing environment will be suitable in this set-up?

Answer:

Distributed Environment:

Question No:3

Which parts of a computer system are most vulnerable when it is attacked by some virus? Write names of at least four (4) parts.

1)      Executable program files.

2)      The file-directory system, which tracks the location of all the computers files.

3)      Boot and system areas, which are needed to start the computer.

4)Data files.

question number 2 ka just ye e answer bnay ga kiya?

RSS

© 2020   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service

.