ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
O
Term-End Examination
O
June, 2015 OSEI-041 : INFORMATION SECURITY Maximum Marks : 50
Time : 2 hours
Note : (i) Section 'A' - Answer all the objective type questions. (ii) Section 'B' - Answer all the very short answer type questions. (iii)Section 'C' - Answer any two questions out of three. (iv)Section 'D' - Answer any two questions out of three. SECTION - A (Objective type questions.) (Attempt all the questions)
1x10=10
1.
What does WWW stand for ? (a) Web World Wide (b) World Web Wide (c) World Wide Web (d) None of the above
1
2.
Which of the following is not an accepted approach to controlling a computer-based information system ? (a) Prohibition (b) Recovery (d) Containment (c) Deterrence
1
OSEI-041
1
P.T.O.
3.
4.
5.
What states that you may use copyrighted material in certain situations-for example, in the creation of new work or within certain limits, for teaching purposes ? (a) Ethics
(b) Intellectual property
(c) Copyright
(d) Fair use doctrine
Which of the following is an example of acting unethically ? (a)
Individuals copy, use and distribute software
(b)
Employees search organizational databases for sensitive corporate and personal information
(c)
Individuals hack into computer systems to steal proprietary information
(d)
All of the above
Which of the following will not protect you from spam ?
In the right setting, a thief will steal your information by simply watching what you type termed as (a)
Snagging
(b)
Spying
(c)
Social engineering
(d)
Shoulder surfing
OSEI-041
2
1
7.
To read the system messages and warnings, access in windows. the (a) system manager (b) control panel (c) event viewer (d) message screen
1
8.
To recover files from a backup, you perform a
1
(a) restore (c) unerase
(b) scan (d) copy
9.
prevents unlawful access to voice The communications by wire. (a) Electronic Communications Privacy Act (b) Freedom of Information Act (c) USA Patriot Act (d) Privacy Act of 1974
1
10.
This power protection device includes a battery that provides a few minutes of power termed as
1
(a) surge suppressor (b) line conditioner (c) generator (d) UPS
11.
SECTION - B (Very short answer type questions.) Write short notes on the following : (a) Black box testing (b) Domain name system (c) File transfer protocol (d) Data encryption (e) Botnets
OSEI-041
3
5x2=10
P.T.O.
SECTION - C (Short answer type questions.)
2x5=10
(Attempt 2 out of 3 short type questions) 12.
Explain the use of hardware protocols.
5
13.
Explain how data integrity and data confidentiality is provided as a part of information security.
5
14.
Compare and contrast between cryptography and cryptology.
5
SECTION - D (Long answer type questions)
2x10=20
(Attempt 2 out of 3 long type questions) 15.
Define security attack. Explain in detail about the various types of attacks an internetwork is vulnerable to.
10
16.
Explain the different measures to be taken for protecting passwords.
(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b) Freedom of Information Act. (c) USA Patriot Act. (d) Privacy Act of 1974. 10.
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.
(c) Time stamp represents the time at which an event is recorded by a computer, not the ... tag or label into a multimedia object. (e) can be defined as the practice.
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
OR. 1.2 What is Domain Name System (DNS) ? How is it related to IP address ? Explain the different components of the following URL â http://www.ignou.ac.in.
NETWORKING (PGDLAN). Term-End Examination. June, 2015. MLI-004 : NETWORKING AND INTERNET. TECHNOLOGY. Time : 2 hours. Maximum Marks : 50. (Weightage : 40%). Note : Answer all questions. All questions carry equal marks. Illustrate your answers with su
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
Answer any two of the following in about. 600 words each : (a) Describe the pedagogical design in e-learning. (b) Explain different types of teleconferencing and discuss their advantages and limitations. (c) What is concept mapping ? Discuss the tool
Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii) Answer any five questions from Part B.
DISASTER MANAGEMENT (PGDDM). Ted Examination. Ui../ thane, 2015. MPA-003 : RISK ASSESSMENT AND. VULNERABILITY ANALYSIS. Time : 2 hours. Maximum Marks : 50. Note : Attempt any five questions in about 400 words each, from the following questions given
June, 2015. ELECTIVE COURSE : POLITICAL SCIENCE. EPS-08 : GOVERNMENT AND POLITICS IN. AUSTRALIA. Time : 3 hours. Maximum Marks : 100. Note. (i) Section I â Answer any ... aboriginals in Australia ? Elaborate. EPS-08. 1. P.T.O. ... Australian politi
BNS-111. No. of Printed Pages : 2. POST BASIC BACHELOR OF SCIENCE. (NURSING) ... (c) Steps of evaluation process of students. (d) Types of data analysis.
Give reasons for your answer. (b) Describe the important features of Microsoft. Excel. Why is it called the most versatile and popular spreadsheet programs ?