P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination December, 2013 MSEI-023 : CYBER SECURITY Maximum Marks : 50
Time : 2 hours
Note : Section A - Answer all the objective type questions. Section B - Answer all very short answer type questions. Section C - Answer 2 out of 3 short answer questions. Section D - Answer 2 out of 3 long questions. SECTION - A (Attempt all objective questions) is a category of computer crime that employs gaining unauthorised access to a computer system.
1
2.
is a non - key attribute whose value is determined from the primary key of other table.
1
3.
(no. 1, no. 2) function returns The the remainder by dividing no. 1 with no. 2.
1
4.
element or In the absence of either a an HTTP header, the default scripting language is assumed to be Java script in most browsers.
1
1.
MSEI-023
1
P.T.O.
5.
is a protocol used to copy a file from one host to another over a TCP / IP based network.
1
6.
is a logically visible subdivision of A an IP network.
1
7.
Class decimal.
1
8.
The full form of RSS in RSS feed is
9.
certain tuples/records satisfying In one type of condition and can be used to generate a horizontal subset of the relation.
1
10.
The is a webpape developing language that enables programmers to create customized taps.
1
address begins with 128 to 191
SECTION - B Five very short answer type questions. (Attempt all the questions) 11.
What do you mean by reverse engineering ?
12.
List some of major e- mail related crimes.
13.
What is the use of minus (-) operator in Search engine ?
14.
How does RSS work ?
2
15.
What is social networking ?
2
MSEI-023
2
SECTION - C (Attempt two out of three Short answer type questions.) 16. Discuss OS password recovery mechanism.
5
17. What is relational algebra ? Discuss two of its operations with the help of a suitable example.
5
18. Explain the Generic architecture of a web 5 browser. SECTION - D (Attempt two out of three Long questions) 19. Explain cross site scripting (XSS) and cross site request forgery (XSRF) attacks and steps to thwart/ avoid such attacks.
10
20. Explain client server architecture . Discuss its types. How does web architecture fit into client server architecture ?
10
21. Explain Security isssues associated with social networking sites. Suggest some measures to be taken by browser/ user to secure the online user on these sites.
11. What do you mean by reverse engineering ? 12. List some of major e- mail related crimes. 13. What is the use of minus (-) operator in Search engine ? 14.
(a) CASCO. (b) Cyber - terrorism. (c) TRIPS Agreement. (d) Cyber defamation. (e) Liability of internet service provider. 2. What is the role of certifying authority ?
Which of the following is the benefit of the. 1 three-tier architecture ? (a). New modules can be built to support specific business needs. (b). Performance improves for compiled SQL statements. (c). Results in a thinner client and database server. (
5. Why we need hybrid IDSs ? 5. Give the difference between Symmetric and. 5. Asymmetric Cryptography. 6. Explain the types of digital watermarks. 5. SECTION - D. (Attempt 2 out of 3 long type questions). 7. Explain the application of Biometrics tech
is a category of computer crime that. 1 employs ... computer system. 2. ... decimal. 8. The full form of RSS in RSS feed is. 9. In certain tuples/records satisfying. 1.
Section A - Answer all the questions. Section B - Answer all the questions. Section C - Answer any three questions out of four. SECTION A. Answer all the questions. 1. Write short notes on the following : 15. (a) User Account Policy. (b) ISO 27001. (
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A. Answer all the questions. 1. Write short notes (any four). 12. (a) CASCO. (b) Cyber - terrorism. (c) T
Time : 2 hours. Maximum Marks : 50. Note : (i) Section - A : objective type questions. (ii) Section - B : very short answer ty pe questions. (iii) Section - C : short answer hoe questions. (iv) Section - D : long answer type questions. SECTION - A. (
P.G. DIPLOMA IN INFORMATION SECURITY. (PGDIS). CN1. Term-End ... What is cloud forensic ? 2. MSEI-027. 3 ... Explain the principles of Computer - Based. Evidence. 17. ... Explain the classification of CFCC (Cyber Frand 10 and Cyber ...
(Attempt 2 out of 3 long questions.) 19. Explain "Log File Analysis". What is "File 10. Carving" in Data recovery ? What is salvaging of data ? 20. What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS. 21. Write a
1. 3. A Recovery Time Objective (RTO) is the period of. 1 time within which systems, processes, services or functions must be recovered after an outage. (a) True.
PG Diploma in Translation & PG Diploma in Vachana St ... -15 onwards syllabus is continued to 2016-17 A.Y.pdf. PG Diploma in Translation & PG Diploma in ...
Spell out in detail the provisions of the Banking Regulation Act, 1949 pertaining to. the conditions under which the R.B.I. may extend license to a Banking ...
PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is continued to 2016-17 A.Y.PDF. PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is ...
Page 1 of 32. 1. INDIAN INSTITUTE OF MATERIALS MANAGEMENT. Post Graduate Diploma in Materials Management. Graduate Diploma in Materials Management. PAPER 12. Packaging & Distribution Management. Date: 14.06.2010 Max Marks: 100. Time: 10.00 AM to 1.00