P.G. DIPLOMA IN INFORMATION SECURITY .0 (PGDIS) NrTerm-End Examination 0 C June, 2015 MSEI-026 : BCP, DR PLANNING AND AUDIT Maximum Marks : 50
Time : 2 hours Note : (i) Section - A : (ii) Section - B : (iii) Section - C : (iv) Section - D :
objective type questions. very short answer type questions. short answer type questions. long answer type questions.
SECTION - A (Attempt all questions.) 1.
What is On Demand Mail Relay (ODMR) ? (a) SMTP extension (b) Protocol for SMTP security (c) Protocol for web pages (d) None of the above
1
2.
Risk identification will be the first step in project management to determine their affect on project. (a) True (b) False
1
MSEI-026
1
P.T.O.
3.
is more powerful and complex than (a) (b) (c) (d)
1
POP3; IMAP4 IMAP4; POP3 SMTP; POP3 None of the above
4.
A security measure to stop unauthorized access to documents is : (a) Business continuity, disaster recovery (b) Network access control (c) Physical access restriction (d) Backup, restore
1
5.
Which of the following backup technique is most space efficient ? (a) Full backup (b) Incremental backup (c) Differential backup (d) None of the above
1
6.
BCP stands for
7.
The main objective of an audit is (a) Expression of opinion (b) Detection and prevention of fraud and error (c) Both (a) and (b) (d) Depends on the type of audit
8.
Error reports are example of (a) Scheduled (b) Demand (c) Exception (d) Predictive
MSEI-026
and DR stands for
2
1
For performing a Risk Analysis, the first step is to analyze the data. (a) True (b) False
1
10. The econometric model requires : (a) A computer (b) Database with economic data (c) Model base of quantitative analysis program (d) All of the above
1
9.
SECTION - B (Attempt all the questions.) 11. What is risk mitigation ?
2
12. Why do we need BCM ?
2
13. What do you understand by auditing ?
2
14. What are the different methods to reduce the impact of risk ?
2
15. Write the purpose and need of Data Recovery.
2
SECTION - C (Attempt 2 out of 3 questions.) 16. What are the different risk analysis techniques ?
5
17. Explain the BMC audit process.
5
18. Write steps to backup and install recovery software on the windows server.
5
MSEI-026
3
P.T.O.
SECTION - D (Attempt 2 out of 3 questions.) 19.
Explain in detail the need of auditing and evaluating BCM.
10
20.
What is crisis management ? Why it is important to identify crisis and why it is done ?
10
21.
Write short notes on the following : (a) Project Management (b) Firewall (c) BCM audit (d) Risk analysis
MSEI-026 No. of Printed Pages : 4 P.G. DIPLOMA IN INFORMATION ...
P.G. DIPLOMA IN INFORMATION SECURITY .0. (PGDIS). N- r-. Term-End Examination. 0. C. June, 2015. MSEI-026 : BCP, DR PLANNING ... (b) Database with economic data. (c) Model base of quantitative analysis program. (d) All of the above. SECTION - B. (Attempt all the questions.) 11. What is risk mitigation ? 2. 12.
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
is the use of the internet or the other 1 electronic means to stalk or harass an individual, a group of individual, or an organization. 8. The name of website containing periodic 1 posts. 9. When examining hard disk without 1 a write-blocker, you sho
software. /. 5. Software piracy is illegal. True or False ? 1. 6. Cryptography is the process of converting between readable text called and an unreadable form called. 1. 7. VPNs stands for. 1. 8. A refers to a skilled hacker who sometimes acts legal
ADMINISTRATION. (DNA). Term-End Examination ... (c) Explain the principles of supervision in ... (b) Explain the elements of evaluation with help of examples.
international trade of services, and state the suggestions made by trade and industry to the. Government for boosting services export. 12+8. 6. Discuss the recent economic developmental trends and foreign trade of Japan. 6+14. 7. (a) Explain briefly
process, enterprise, project or product. 3. Often there may be a BCM plan but it may not. 1 contain a ... In MS project a task that must be completed before 1 another task can start is called a. 8. For performing a Risk ... Explain the difference bet
MSEI-025 : APPLICATION AND BUSINESS. SECURITY DEVELOPMENTS. Time : 2 hours. Maximum Marks : 50. Note : Section (A) - Answer all the objective type ... What are " Application Maintenance Activities ". 5 and " Digest Access Authentication"? 18. Explain
(a) Common Management In Protocol. (b) Common Management Inter Protocol. (c) Common Management Internet Protocol. (d) None of these. 7. IDPS and IPS stands for and. 1. 8. SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1.
SECTION - A. (Attempt all the questions). 1. Write True or False. 1x5=5. (a) Firewalls can greatly decrease the security of a host or a network. (b) Full form of PGP is Pretty Good Privacy. (c) Time stamp represents the time at which an event is reco
EDGE stnds for Enhanced Data GSM 1. Environment. (a) TRUE. (b) FALSE. 10. is the collection of infected computers 1 or bots that have been taken over by ...
0. DIPLOMA IN ELEMENTARY EDUCATION. (D.ELEd.) Term-End Examination. June, 2015. BES-017 : SCHOOL EDUCATION, LEADERSHIP. AND CHANGE. Time : 3 hours. Maximum Weightage : 70%. Note : (i) All four questions are compulsory. (ii) All questions carry equal
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
SMB and SAM stands for and 1. 9. One of the well known webserver is SAMBA : 1. (a) True. (b) False. 10. GUI stands for Graph User Interface. 1. (a) True. (b) False ... Explain the difference between 'LINUX' and. 5. "UNIX" operating system. 17. Explai
One of the well known Operating System is 1. "Microsoft Windows Defender". (a) TRUE. (b) FALSE. 10. GUI stands for "Graphical User Interface". 1. (a) TRUE ... Write a short note on "Network Firewall" and. 2. "Antivirus Software". SECTION - C. Short a
Section D - Answer any two out of three long questions. SECTION - A. Objective type questions. (Attempt all the questions) : 1. PDA stands for. 1. (a) Personal Digital Assistant. (b) Personal Digital Admin. (c) Personal Digital Admission. (d) None of
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
P.G. DIPLOMA IN INFORMATION SECURITY. cV. (PGDIS). 00. Term-End Examination. O. June, 2014 ... Regular auditing and accounting of your system 1 is useful not only for detecting intruders but also as a form of. MSEI- ... by software development compan
transfer of information. (e) A computer used as trap set to detect or 1 deflect unauthorised use is known as. SECTION - B. (Attempt all the questions). 3. Write short notes on the following : (a) IP Datagram. (b) Functions of the Firewall. (c) Stegan
SECTION - A. (Attempt all the questions). 10x1=10. 1. In an HTML document where is the correct place to refer to an external style sheet ? (a) At the top of the document. (b) In the section. (c) In the section. (d) At the end of the document. 2. Wh