N- ADVANCED CERTIFICATE IN INFORMATION oo SECURITY (ACISE) C
Term-End Examination June, 2016 OSEI-041 : INFORMATION SECURITY Time : 2 hours Note :
Maximum Marks : 50 Section A - Answer all the objective questions. Section B - Answer all the very short answer questions. Section C - Answer any two questions out of three. Section D Answer any two questions out of three. SECTION - A Objective questions (Attempt all the questions)
1.
A stateful firewall maintains a which is a list of active connections. (a) routing table (b) bridging table (c) state table (d) connection table
1
2. NTFS stands for
1
3. VOIP stands for
1
OSEI-041
1
P.T.O.
4.
A firewall needs to be so that it can grow with the network it protects. (a) robust (b) expensive (c) fast (d) scalable
1
5. Accurate and complete data enters the system for processing and remains accurate thereafter, is said to have : (a) Integrity (b) Security (c) Viruses (d) Accidental deletion
1
6. Worms and viruses are programs that can cause destruction of data and software, but they differ on how they spread and function. (a) True (b) False
1
7. Inaccurate data entry, worms and viruses, fraud and hardware malfunction are ways which affects : (a) Data Security (b) Users (c) Software (d) Database
1
8. How are viruses spread ? (a) Through firewalls (b) downloading infected programs and files from internet (c) Garbled information (d) install anti-virus
1
OSEI-041
2
provides a connection-oriented reliable service for sending messages. (a) TCP (b) IP (c) UDP (d) All of the above
1
10. A firewall is a secure and trusted machine that sits between a private and public network. (a) True (b) False
1
9.
SECTION - B Very short questions (Attempt all the questions) 11. Define physical security.
2
12. What are the critical characteristics of information ?
2
13. What are the components of an information system ?
2
14. What is the difference between a threat agent and a threat ?
2
15. What is hacking ?
2
OSEI-041
3
P.T.O.
SECTION - C Short answer questions (Attempt 2 out of 3 questions) 16.
What are "computer worms" ? How they are different from "Computer Viruses" ?
17.
What do you understand by cryptographic protocol ? Explain with the help of suitable examples.
18.
Explain the role of security protocols.
5
SECTION - D Long answer questions (Attempt 2 out of 3 questions) 19.
Discuss in detail, how a computer system can be 10 attacked ? Also discuss the protection measures.
20.
What is authentication mechanism ? Explain in 10 detail.
21.
What is an information security blueprint ? 10 Indentify its major components and explain how it supports the information security program ?
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 2016. OSEI-041 : INFORMATION SECURITY. Time : 2 hours. Maximum Marks : 50 ...
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.