No. of Printed Pages : 4

IOSEI-041I

N

N- ADVANCED CERTIFICATE IN INFORMATION oo SECURITY (ACISE) C

Term-End Examination June, 2016 OSEI-041 : INFORMATION SECURITY Time : 2 hours Note :

Maximum Marks : 50 Section A - Answer all the objective questions. Section B - Answer all the very short answer questions. Section C - Answer any two questions out of three. Section D Answer any two questions out of three. SECTION - A Objective questions (Attempt all the questions)

1.

A stateful firewall maintains a which is a list of active connections. (a) routing table (b) bridging table (c) state table (d) connection table

1

2. NTFS stands for

1

3. VOIP stands for

1

OSEI-041

1

P.T.O.

4.

A firewall needs to be so that it can grow with the network it protects. (a) robust (b) expensive (c) fast (d) scalable

1

5. Accurate and complete data enters the system for processing and remains accurate thereafter, is said to have : (a) Integrity (b) Security (c) Viruses (d) Accidental deletion

1

6. Worms and viruses are programs that can cause destruction of data and software, but they differ on how they spread and function. (a) True (b) False

1

7. Inaccurate data entry, worms and viruses, fraud and hardware malfunction are ways which affects : (a) Data Security (b) Users (c) Software (d) Database

1

8. How are viruses spread ? (a) Through firewalls (b) downloading infected programs and files from internet (c) Garbled information (d) install anti-virus

1

OSEI-041

2

provides a connection-oriented reliable service for sending messages. (a) TCP (b) IP (c) UDP (d) All of the above

1

10. A firewall is a secure and trusted machine that sits between a private and public network. (a) True (b) False

1

9.

SECTION - B Very short questions (Attempt all the questions) 11. Define physical security.

2

12. What are the critical characteristics of information ?

2

13. What are the components of an information system ?

2

14. What is the difference between a threat agent and a threat ?

2

15. What is hacking ?

2

OSEI-041

3

P.T.O.

SECTION - C Short answer questions (Attempt 2 out of 3 questions) 16.

What are "computer worms" ? How they are different from "Computer Viruses" ?

17.

What do you understand by cryptographic protocol ? Explain with the help of suitable examples.

18.

Explain the role of security protocols.

5

SECTION - D Long answer questions (Attempt 2 out of 3 questions) 19.

Discuss in detail, how a computer system can be 10 attacked ? Also discuss the protection measures.

20.

What is authentication mechanism ? Explain in 10 detail.

21.

What is an information security blueprint ? 10 Indentify its major components and explain how it supports the information security program ?

OSEI-041

4

ACISE

A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 2016. OSEI-041 : INFORMATION SECURITY. Time : 2 hours. Maximum Marks : 50 ...

39KB Sizes 8 Downloads 215 Views

Recommend Documents

ACISE
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the

ACISE
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...

ACISE
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.

ACISE
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo

ACISE
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input

ACISE
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P). No. of Printed Pages : 2. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Practical Examination. 00284. December ...

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?

(ACISE) Term-End Examination June, 2015 OSEI-041
(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b)

(ACISE) c:D Term-End Practical Examination June, 2016 OSEI-044
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co

(ACISE) Term-End Examination June, 2014 OSEI-041
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.