es4 ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) 0 Term-End Examination June, 2016 OSEI-042 : SECURING INTERNET ACCESS Time : 2 hours
Maximum Marks : 50
Note : Section - A : Answer all the objective type questions. Section - B : Answer all the very short answer type questions. Section - C : Answer two out of three short answer type questions. Section - D : Answer two out of three long answer type questions.
SECTION - A (Attempt all the questions.) 1. Message means that the sender and the receiver expect privacy. (a)
confidentiality
(b)
integrity
(c)
authentication
(d)
none of the above
OSEI-042
1
1
P.T.O.
2.
Digital signature cannot provide the message. (a) integrity (b) confidentiality (c) non repudiation (d) authentication
for
1
3. Password based authentication can be divided into two broad categories : and
1
(a) (b) (c) (d)
fixed; variable time stamped; fixed fixed; one-time none of the above
4.
The secret key between members needs to be created as a key when two members contact KDC. (a) public (b) session (c) complimentary (d) none of the above
1
5.
Risk assessment is the various techniques which minimise the risk to other people. (a) True (b) False
1
6.
is the network of networks spread across the globe.
1
is the main concern for any
1
7. organization.
OSEI-042
2
8.
1
Data security threats include : (a) Hardware failure (b) Privacy invasion (c) Fraudulent manipulation of data (d) All of the above
9. A protocol used to control the secure sending of data on the internet is : (a) SMTP (b) HTTPS (c) TCP/ IP (d) FITTP
1
10. The bluetooth supports : (a) point-to-point connections (b) point-to-multipoint connection (c) both (a) and (b) (d) none of the above
1
SECTION - B (Attempt all the very short answer type questions.) 11.
Do cyber crimes occur on social networking sites like facebook ? How ?
2
12.
Write a note on recommendations for secure wireless networks.
2
13.
How do I get infected with spyware ?
2
14.
Discuss e-cards.
2
15.
Write a short note on DES.
2
OSEI-042
3
P.T.O.
SECTION - C (Attempt two out of three short answer type questions.) 16.
How is a web service activated ?
5
17.
What is a counterfeit credit card ?
5
18.
Write the different methods used to detect and prevent the cyber-attack.
5
SECTION - D (Attempt two out of three long answer type questions.) 19.
How to prevent and report credit card fraud or 10 identify theft ?
20.
What is Phishing ? How it works ? How a user 10 can prevent him from being a victim of phishing attack ?
21.
Write a descriptive note on web services security 10 standards. Also, discuss the threats and attacks with respect to session management.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it works ? How a user 10 can prevent him from being a victim of phishing attack ?
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.