No. of Printed Pages : 3

OSEI-042

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)

N-

N

-9-•••■

Term-End Examination

0 0

June, 2014 OSEI-042 : SECURING INTERNET ACCESS Time : 2 hours

Maximum Marks : 50

Note : Section A : Answer all the objective questions. Section B : Answer all the very short answer type questions. Section C : Answer 2 out of 3 short answer type questions. Section D : Answer 2 out of 3 long answer type questions. SECTION - A ( Attempt all the questions )

1x10=10

1.

A file that lists the actions that have occurred is called a file.

2.

RSA is

3.

User can create their own tags using

4.

Web services platform elements include SOAP, UDDI and

OSEI-042

key cryptosystem.

1

P.T.O.

5.

Criminals bombard the service providers with requests so that they are not able to process genuine user service requests. This is known as

6.

The term used for water marking of compressed data such as video is known as

7.

Class 1 Bluetooth devices have the range of metres.

8.

A text file used for checking user's Internet related activities is called

9.

For sending an e-mail, we generally use server.

10.

is a computer program that can copy itself and infect a computer. SECTION - B (Attempt all the questions)

11. Write short notes on : (a) Types of cookies (b) Types of cables (c) Online banking related threats (d) Web services (e) Identity Theft OSEI-042

2

2x5=10

SECTION - C (Attempt 2 out of 3 short answer type questions)

5x2=10 12. Write a short note on Laws for Internet Privacy Protection. 13. How does Wi-Fi technology help in building network infrastructure ? 14. Classify cyber crime depending on the victim. Briefly describe each of them. SECTION - D (Attempt 2 out of 3 long answer type questions) 10x2=20 15. Explain the security design considerations in web services. 16. Assume yourself to be Network Administrator of an educational institution that provides Internet access to its student (s), faculty members etc. via, laptop, desktop or mobile etc. What guidelines would you put in place for securing Internet Access. Give the threat assessment and then the solution for threat. 17. What is the problem of identity theft in online world ? What measures should be taken up to prevent Identity theft ?

OSEI-042

3

ACISE

Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using. 4. Web services platform elements include SOAP,. UDDI and. OSEI-042. 1. P.T.O. ...

22KB Sizes 4 Downloads 198 Views

Recommend Documents

ACISE
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the

ACISE
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201

ACISE
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...

ACISE
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo

ACISE
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input

ACISE
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P). No. of Printed Pages : 2. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Practical Examination. 00284. December ...

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE ...
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?

(ACISE) Term-End Examination June, 2015 OSEI-041
(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b)

(ACISE) c:D Term-End Practical Examination June, 2016 OSEI-044
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co

(ACISE) Term-End Examination June, 2014 OSEI-041
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.