ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
op
C
c:D
Term-End Practical Examination June, 2016 OSEI-044 (P) : SERVER SECURITY Time : 3 hours
Maximum Marks : 100
Note : (i) Attempt any two out of three questions carrying 40 marks each. (ii) Viva-voce carries 20 marks.
1.
Create a web page in HTML and display students records using tables. Also uses ordered list and unordered list.
40
2.
Browse Internet using Mozilla Firefox and do the following : (a) Disable the Java Script (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page.
40
3.
Create a log file and display its contents. Manage exception in firefox and configure firefox to connect to the Internet.
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and configure firefox to connect to the Internet. OSEI-044 (P). 1. 40.
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.
POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. O. (PGDLAN). O. Term-End Practical Examination. June, 2016. MLIL-005 : INTERNET RESOURCES. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40. Viva Voce : 10). (Weightage : 40
The National Institute of Engineering Science and. 40 ... institute was Civil Engineering College of India, ... Science and Engineering, School of Management.
MLIL-0061. No. of Printed Pages : 3. POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. (PGDLAN). Term-End Practical Examination. June, 2016. MLIL-006 : CONTENT DEVELOPMENT. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40.
A leading FMCG manufacturer currently markets its brand of a clothes starch which is in dissolvable powder form. It now plans to launch a spray version of this ...
June, 2013. MMTE-006 (P) : CRYPTOGRAPHY. Time : 11/2 hours. Maximum Marks : 40. Note : There are two questions in this paper totalling 30 marks. Answer both of them. Remaining 10 marks are for the viva-voce. 1. The following text was encrypted using
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
(iv) Ghee is obtained from bone. (v) Insulin is produced by pituitary gland. (vi) Submucosa layer of intestine is used as casing. 2. (a) Write about the benefits of utilization of animal by-products. 5 ... setting up a by-product processing plant ? 3
20. What are the different types of Weaker Section. Cooperatives ? Discuss the activities of Tribal. Co-operatives Marketing Development Federation of India Ltd. (TRIFED). 21. Explain the Cooperative Credit Structure in India. 22. Discuss the structu
(d) Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and ...
(a) What is "Training Needs Assessment" ? 10. Discuss tools used for training needs assessment. (b) Examine the sources that could be used for 10 identifying ...