ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) Term-End Practical Examination
0028 4
December, 2014
OSEI-044 (P) : SERVER SECURITY Maximum Marks : 100
Time : 3 hours Note :
Attempt any two out of three questions, each carrying 40 marks. Viva-Voce carries 20 marks.
1.
2.
Install the web server and find out its vulnerabilities and prepare the audit report Apply the cross-site scripts and fetch the existing cookies generated by any website.
40
Create the new user with the restricted privileges that are as follows :
40
(a)
User cannot access the registries.
(b)
User cannot install the softwares.
(c)
User cannot access the hidden files.
(d)
User cannot access the Pen Drives.
(e)
User cannot change the Passwords.
Also generate the report of all the activities implemented on the machine. OSEI-044 (P)
1
P.T.O.
3.
Perform the E-mail Investigation and find out the following details :
40
(a) The E-mail Originating IP Address, Country, ISP. (b) Login Details of Last Accessed E-mail ID. (c) Change the Default Signatures. (d) Generate the Auto Reply Mail.
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
will be done on WhatsApp a student should have a âsmartphoneâ with WhatsApp access. ICT forms an integral part of the ACT programme. You will be provided ...
CERTIFICATE IN INFORMATION. TECHNOLOGY (CIT). Term-End Examination. June, 2014. CIT-003 : WEB BASED TECHNOLOGIES AND. MULTIMEDIA APPLICATIONS. Time : 2 hours. Maximum Marks : 50. (Weightage : 75%). Note : There are two sections in this paper. Section
none of the above. (g) Frame page : (i) acts like a container. (ii) stores HTML text based web pages only. (iii) cannot contain another frame. (iv) none of the above. (h) â¢MPEG is used as : picture storage video compression standard frame storage n
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain
Explain any two technologies used for. E-learning. (b) What is computer vision ? Explain any two applications of computer vision. 5. 15. (a) What are the different types of e-commerce models ? Discuss them with appropriate examples. 5. (b) What are t
sound, graphics, photographs/images, animation, simulation, games, video, etc. 1. 10. ... applications of computer vision. 5. 15. (a) What are the different types of ...
mark. 10x1.10. (a) The is a cable which carries signals representing data from one place to another. (i). Register. (ii) Bus. (iii) Multiplexer. (iv) Interface. CIT-001.
(c) A group of 8-bits is known as. (i) word. (ii) byte. (iii) nibble. (iv) kilobyte. (d) The information which is permanently stored in a ROM chip is called as. (i) hardware. (ii) software. (iii) firmware. (iv) application software. (e) Operating Sys
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Advanced ...
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more