No. of Printed Pages : 4

I OSEI-042 I

es4 ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) 0 Term-End Examination June, 2016 OSEI-042 : SECURING INTERNET ACCESS Time : 2 hours

Maximum Marks : 50

Note : Section - A : Answer all the objective type questions. Section - B : Answer all the very short answer type questions. Section - C : Answer two out of three short answer type questions. Section - D : Answer two out of three long answer type questions.

SECTION - A (Attempt all the questions.) 1. Message means that the sender and the receiver expect privacy. (a)

confidentiality

(b)

integrity

(c)

authentication

(d)

none of the above

OSEI-042

1

1

P.T.O.

2.

Digital signature cannot provide the message. (a) integrity (b) confidentiality (c) non repudiation (d) authentication

for

1

3. Password based authentication can be divided into two broad categories : and

1

(a) (b) (c) (d)

fixed; variable time stamped; fixed fixed; one-time none of the above

4.

The secret key between members needs to be created as a key when two members contact KDC. (a) public (b) session (c) complimentary (d) none of the above

1

5.

Risk assessment is the various techniques which minimise the risk to other people. (a) True (b) False

1

6.

is the network of networks spread across the globe.

1

is the main concern for any

1

7. organization.

OSEI-042

2

8.

1

Data security threats include : (a) Hardware failure (b) Privacy invasion (c) Fraudulent manipulation of data (d) All of the above

9. A protocol used to control the secure sending of data on the internet is : (a) SMTP (b) HTTPS (c) TCP/ IP (d) FITTP

1

10. The bluetooth supports : (a) point-to-point connections (b) point-to-multipoint connection (c) both (a) and (b) (d) none of the above

1

SECTION - B (Attempt all the very short answer type questions.) 11.

Do cyber crimes occur on social networking sites like facebook ? How ?

2

12.

Write a note on recommendations for secure wireless networks.

2

13.

How do I get infected with spyware ?

2

14.

Discuss e-cards.

2

15.

Write a short note on DES.

2

OSEI-042

3

P.T.O.

SECTION - C (Attempt two out of three short answer type questions.) 16.

How is a web service activated ?

5

17.

What is a counterfeit credit card ?

5

18.

Write the different methods used to detect and prevent the cyber-attack.

5

SECTION - D (Attempt two out of three long answer type questions.) 19.

How to prevent and report credit card fraud or 10 identify theft ?

20.

What is Phishing ? How it works ? How a user 10 can prevent him from being a victim of phishing attack ?

21.

Write a descriptive note on web services security 10 standards. Also, discuss the threats and attacks with respect to session management.

OSEI-042

4

ACISE

18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it works ? How a user 10 can prevent him from being a victim of phishing attack ?

35KB Sizes 14 Downloads 231 Views

Recommend Documents

ACISE
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the

ACISE
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201

ACISE
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...

ACISE
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.

ACISE
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input

ACISE
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P). No. of Printed Pages : 2. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Practical Examination. 00284. December ...

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?

(ACISE) Term-End Examination June, 2015 OSEI-041
(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b)

(ACISE) c:D Term-End Practical Examination June, 2016 OSEI-044
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co

(ACISE) Term-End Examination June, 2014 OSEI-041
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.