No. of Printed Pages : 4

OSEI-041

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)

O

Term-End Examination

O

June, 2015 OSEI-041 : INFORMATION SECURITY Maximum Marks : 50

Time : 2 hours

Note : (i) Section 'A' - Answer all the objective type questions. (ii) Section 'B' - Answer all the very short answer type questions. (iii)Section 'C' - Answer any two questions out of three. (iv)Section 'D' - Answer any two questions out of three. SECTION - A (Objective type questions.) (Attempt all the questions)

1x10=10

1.

What does WWW stand for ? (a) Web World Wide (b) World Web Wide (c) World Wide Web (d) None of the above

1

2.

Which of the following is not an accepted approach to controlling a computer-based information system ? (a) Prohibition (b) Recovery (d) Containment (c) Deterrence

1

OSEI-041

1

P.T.O.

3.

4.

5.

What states that you may use copyrighted material in certain situations-for example, in the creation of new work or within certain limits, for teaching purposes ? (a) Ethics

(b) Intellectual property

(c) Copyright

(d) Fair use doctrine

Which of the following is an example of acting unethically ? (a)

Individuals copy, use and distribute software

(b)

Employees search organizational databases for sensitive corporate and personal information

(c)

Individuals hack into computer systems to steal proprietary information

(d)

All of the above

Which of the following will not protect you from spam ?

1

1

1

(a) Spam blockers (b) e-mail rules (c) Popup blocker (d) Filters 6.

In the right setting, a thief will steal your information by simply watching what you type termed as (a)

Snagging

(b)

Spying

(c)

Social engineering

(d)

Shoulder surfing

OSEI-041

2

1

7.

To read the system messages and warnings, access in windows. the (a) system manager (b) control panel (c) event viewer (d) message screen

1

8.

To recover files from a backup, you perform a

1

(a) restore (c) unerase

(b) scan (d) copy

9.

prevents unlawful access to voice The communications by wire. (a) Electronic Communications Privacy Act (b) Freedom of Information Act (c) USA Patriot Act (d) Privacy Act of 1974

1

10.

This power protection device includes a battery that provides a few minutes of power termed as

1

(a) surge suppressor (b) line conditioner (c) generator (d) UPS

11.

SECTION - B (Very short answer type questions.) Write short notes on the following : (a) Black box testing (b) Domain name system (c) File transfer protocol (d) Data encryption (e) Botnets

OSEI-041

3

5x2=10

P.T.O.

SECTION - C (Short answer type questions.)

2x5=10

(Attempt 2 out of 3 short type questions) 12.

Explain the use of hardware protocols.

5

13.

Explain how data integrity and data confidentiality is provided as a part of information security.

5

14.

Compare and contrast between cryptography and cryptology.

5

SECTION - D (Long answer type questions)

2x10=20

(Attempt 2 out of 3 long type questions) 15.

Define security attack. Explain in detail about the various types of attacks an internetwork is vulnerable to.

10

16.

Explain the different measures to be taken for protecting passwords.

10

17.

Explain how you can have secure internet surfing.

10

OSEI-041

4

(ACISE) Term-End Examination June, 2015 OSEI-041

(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b) Freedom of Information Act. (c) USA Patriot Act. (d) Privacy Act of 1974. 10.

27KB Sizes 3 Downloads 204 Views

Recommend Documents

(ACISE) c:D Term-End Practical Examination June, 2016 OSEI-044
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co

(ACISE) Term-End Examination June, 2014 OSEI-041
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.

Term-End Examination June, 2015 MSEI-022
(c) Time stamp represents the time at which an event is recorded by a computer, not the ... tag or label into a multimedia object. (e) can be defined as the practice.

ACISE
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the

ACISE
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201

ACISE
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...

ACISE
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.

ACISE
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo

ACISE
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input

ACISE
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain

(PGDLAN) Term-End Examination June, 2015 MLI-004 - IGNOU
OR. 1.2 What is Domain Name System (DNS) ? How is it related to IP address ? Explain the different components of the following URL — http://www.ignou.ac.in.

(PGDLAN) Term-End Examination June, 2015 MLI-004 - IGNOU
NETWORKING (PGDLAN). Term-End Examination. June, 2015. MLI-004 : NETWORKING AND INTERNET. TECHNOLOGY. Time : 2 hours. Maximum Marks : 50. (Weightage : 40%). Note : Answer all questions. All questions carry equal marks. Illustrate your answers with su

(PGDIS) Term-End Examination O June, 2015 O MSEI-027
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).

M.A. (DISTANCE EDUCATION) Term-End Examination June, 2015
Answer any two of the following in about. 600 words each : (a) Describe the pedagogical design in e-learning. (b) Explain different types of teleconferencing and discuss their advantages and limitations. (c) What is concept mapping ? Discuss the tool

(PGCCL) 00 Term-End Examination tr) June, 2015 MIR-014
Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii) Answer any five questions from Part B.

M.A. (DISTANCE EDUCATION) Term-End Examination June, 2015
MDE-418. M.A. (DISTANCE EDUCATION). CO. Term-End Examination. Co. June, 2015. O o MDE-418 : EDUCATIONAL COMMUNICATION. TECHNOLOGIES.

June 2015
DISASTER MANAGEMENT (PGDDM). Ted Examination. Ui../ thane, 2015. MPA-003 : RISK ASSESSMENT AND. VULNERABILITY ANALYSIS. Time : 2 hours. Maximum Marks : 50. Note : Attempt any five questions in about 400 words each, from the following questions given

June 2015
Explain the operation of an On-site Treatment 10 plant of waste water in a health care facility. 2. List the importance of monitoring of health care.

June 2015
June, 2015. ELECTIVE COURSE : POLITICAL SCIENCE. EPS-08 : GOVERNMENT AND POLITICS IN. AUSTRALIA. Time : 3 hours. Maximum Marks : 100. Note. (i) Section I — Answer any ... aboriginals in Australia ? Elaborate. EPS-08. 1. P.T.O. ... Australian politi

June 2015
BNS-111. No. of Printed Pages : 2. POST BASIC BACHELOR OF SCIENCE. (NURSING) ... (c) Steps of evaluation process of students. (d) Types of data analysis.

June 2015
.71." O. June, 2015. BHM-002 : HEALTHCARE WASTE. MANAGEMENT : CONCEPTS, TECHNOLOGIES. AND TRAINING. Time : 3 hours. Maximum Marks : 70.

June 2015
IN COMPUTER SCIENCE). M.Sc. (MACS). Term-End Examination. June, 2015. 00898. MMT-005 : COMPLEX ANALYSIS. Time : 1-1- hours. Maximum Marks : ...

June 2015
Give reasons for your answer. (b) Describe the important features of Microsoft. Excel. Why is it called the most versatile and popular spreadsheet programs ?

June, 2015
O. MFP-4 : CURRENCY AND DEBT MARKETS. Time : 3 hours. Maximum Marks : 100. Note : Answer any five questions. All questions carry equal marks. 1.