Question 1
[20)
(a} What are Cyber Kill Chain stages?Explain the attack example for each stage of the Cyber kill
Chain.
'[10]
(b} Provide two examples of defence techniques you can implement at each of the following stages
of a Cyber Kill Chain.
[10]
Question 2
[20)
(a) How do the threat actors carry out their attack? Explain the attack methods
[10]
(b) Explain the design for insider risk?
[10]
Question 3
[20)
(a) Explain CIATriad in the context of reliability and security.
[10]
(b) While implementing the least privilege model, what are the best practices that need to be
followed?
[10]
Question 4
[20)
(a) Explain the design principle for Recovery.
[10]
(b) What is the motivation for the attackers?
[10]
Question 5
[20)
(a) What is Trojan Horse? Explainthe stages ofTrojan Horse.
[10)
(b) What do you mean by controlling the blast radius?
[10)