MSEI-021 : INTRODUCTION TO INFORMATION SECURITY Time : 2 hours Maximum Marks : 50 Note : Section 'A' - Answer all the objective type questions. Section 'B' - Answer all the very short answer type questions. Section 'C' - Answer any two questions out of three. Section 'D' - Answer any two questions out of three. SECTION - A Objective type questions. (Attempt all the questions.) 1.
FTP stands for (a) File Transforming Protocol (b) File Transformation Protocol (c) File Transport Protocol (d) None of these
1
2.
refers to all programmes that make the computer work. It manages the resources of the computer such as the central processor, communications links and input / output devices.
1
3.
is the powerful version of and is completely free of cost, it offers multi tasking, virtual memory management and TCP/IP networking etc.
1
MSEI-021
1
P.T.O.
4.
In DOS Attack " DOS " stands for " Disk Operating System". (b) False (a) True
1
5.
Black Hat Hackers are the Hackers known as " Cyber Criminals" (b) False (a) True
1
6.
CMIP stnads for (a) Common Management In Protocol (b) Common Management Inter Protocol (c) Common Management Internet Protocol (d) None of these
1
8. SMB and SAM stands for 9.
1
and
7. IDPS and IPS stands for
and
One of the well known webserver is SAMBA : (b) False (a) True
10. GUI stands for Graph User Interface (b) False (a) True
1 1 1
SECTION - B Very short type questions. (Attempt all the questions) 11. Explain SAMBA.
2
12. Write a short note on "Network Firewall" and "Antivirus Software"
2
13. What is operating system? Explain.
2
14. Write any two precautions for operating system 2 security. 15. Explain Phishing Attack. MSEI-021
2
2
SECTION - C Short answer type questions. (Attempt 2 out of 3 questions.) 16.
Explain the difference between 'LINUX' and "UNIX" operating system.
5
17.
Explain Half Duplex and Full Duplex mode of Data Transmission.
5
18.
What are the two methods for computing passwords ?
5
SECTION - D Long answer type questions. (Attempt 2 out of 3 questions) 10
19.
Explain the layers of OSI Model.
20.
Answer the following (Attempt all the parts). 5x2=10 (a) What is operating system ?' Write a short note on " History of operating (b) system". (c) What are the types of operating system ? (d) What are the uses of operating system ? (e) What is the use of Real Time Operating System ?
21.
Explain the given terms : (a) E-mail (b) GOPHER (c) Cyber crime (d) USNET (e) Firewall and its security
MSEI-021 No. of Printed Pages : 3 P.G. DIPLOMA IN INFORMATION ...
SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1. (a) True. (b) False. 10. GUI stands for Graph User Interface. 1. (a) True. (b) False ... Explain the difference between 'LINUX' and. 5. "UNIX" operating system. 17. Explain Half Duplex and Full Duplex mode of 5. Data Transmission. 18. What are ...
process, enterprise, project or product. 3. Often there may be a BCM plan but it may not. 1 contain a ... In MS project a task that must be completed before 1 another task can start is called a. 8. For performing a Risk ... Explain the difference bet
MSEI-025 : APPLICATION AND BUSINESS. SECURITY DEVELOPMENTS. Time : 2 hours. Maximum Marks : 50. Note : Section (A) - Answer all the objective type ... What are " Application Maintenance Activities ". 5 and " Digest Access Authentication"? 18. Explain
(a) Common Management In Protocol. (b) Common Management Inter Protocol. (c) Common Management Internet Protocol. (d) None of these. 7. IDPS and IPS stands for and. 1. 8. SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1.
SECTION - A. (Attempt all the questions). 1. Write True or False. 1x5=5. (a) Firewalls can greatly decrease the security of a host or a network. (b) Full form of PGP is Pretty Good Privacy. (c) Time stamp represents the time at which an event is reco
EDGE stnds for Enhanced Data GSM 1. Environment. (a) TRUE. (b) FALSE. 10. is the collection of infected computers 1 or bots that have been taken over by ...
One of the well known Operating System is 1. "Microsoft Windows Defender". (a) TRUE. (b) FALSE. 10. GUI stands for "Graphical User Interface". 1. (a) TRUE ... Write a short note on "Network Firewall" and. 2. "Antivirus Software". SECTION - C. Short a
Section D - Answer any two out of three long questions. SECTION - A. Objective type questions. (Attempt all the questions) : 1. PDA stands for. 1. (a) Personal Digital Assistant. (b) Personal Digital Admin. (c) Personal Digital Admission. (d) None of
P.G. DIPLOMA IN INFORMATION SECURITY. cV. (PGDIS). 00. Term-End Examination. O. June, 2014 ... Regular auditing and accounting of your system 1 is useful not only for detecting intruders but also as a form of. MSEI- ... by software development compan
transfer of information. (e) A computer used as trap set to detect or 1 deflect unauthorised use is known as. SECTION - B. (Attempt all the questions). 3. Write short notes on the following : (a) IP Datagram. (b) Functions of the Firewall. (c) Stegan
ADMINISTRATION. (DNA). Term-End Examination ... (c) Explain the principles of supervision in ... (b) Explain the elements of evaluation with help of examples.
DIPLOMA IN BUSINESS PROCESS. 00 ... (d) The rate of number of payments actually. 1 received to ... the e-mail and telephone calls as collection tools. 2.5. 5.
software. /. 5. Software piracy is illegal. True or False ? 1. 6. Cryptography is the process of converting between readable text called and an unreadable form called. 1. 7. VPNs stands for. 1. 8. A refers to a skilled hacker who sometimes acts legal
Discuss the Upper Palaeolithic culture of. Europe. 20. 10. Write short notes on any two of the following : 10+10. (a) River Terrace. (b) Holocene. (c) Levalloisian ...
is the use of the internet or the other 1 electronic means to stalk or harass an individual, a group of individual, or an organization. 8. The name of website containing periodic 1 posts. 9. When examining hard disk without 1 a write-blocker, you sho
P.G. DIPLOMA IN INFORMATION SECURITY .0. (PGDIS). N- r-. Term-End Examination. 0. C. June, 2015. MSEI-026 : BCP, DR PLANNING ... (b) Database with economic data. (c) Model base of quantitative analysis program. (d) All of the above. SECTION - B. (Att
SECTION - A. (Attempt all the questions). 10x1=10. 1. In an HTML document where is the correct place to refer to an external style sheet ? (a) At the top of the document. (b) In the section. (c) In the section. (d) At the end of the document. 2. Wh
learning by both individuals and groups. With the development of digital technology, libraries have undergone significant transformation. Today digital libraries and digital resources have become vital in management education. Questions : (a) As a ma
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat