ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) Term-End Examination December, 2013 OSEI-044 : SERVER SECURITY Maximum Marks : 50
Time : 2 hours
Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A (Attempt all the questions)
1x10=10
1.
The full form of SMTP is
2.
is a parasitic software that is secretly installed on your computer when you download and install software online.
3.
is the most common bootloader for x 86 machines.
4.
is the most popular scripting language on the Internet.
OSEI-044
1
P.T.O.
5.
are small pieces of information that a server sends to a browser to be stored on the client machine.
6.
attack involves firing a SQL query A via the input data from the client to the application.
7.
attack, the attacker attempts to In insert himself in the middle of a communication.
8.
Identify theft is also known as
9.
WPA is
10.
AMPS stands for
(more/less) secure than WEP.
SECTION - B 11.
Write short notes on the following : (a) Managing Rogue Risk (b) Denial of service (c) Kerberos (d) Firewall (e) Attack vector
2x5=10
SECTION - C
12.
5x2=10 (Attempt any 2 out of 3 short answer type questions) Describe various runlevels of Linux.
13.
Write short note on wireless attacks detection techniques.
14.
What are the main challenges of building secure software.
OSEI-044
2
SECTION - D (Attempt 2 out of 3 long questions)
10x2=20
15.
Describe how do the spoofers scammer get the e-mail addresses ? Suggest ways to deal with the same and prevention guidelines.
16.
What are various modes of unauthorised access in wireless ? Explain.
17.
What are various threats that can be used on a web application ? Describe any three attacks in detail.
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the input data from the client to the application. 7. In attack, the attacker attempts to.
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.