um ADVANCED CERTIFICATE IN INFORMATION SECURITY Term-End Practical Examination June, 2015 OSEI-044 (P) : SERVER SECURITY Time : 3 hours
Maximum Marks : 100
Note : (i) Attempt any two out of three questions carrying 40 marks each. (ii) Viva-voce carries 20 marks.
1.
Create a MS-Word file and protect with the password any try to hack the password by using third party utilities and apply the Encryption and Decryption Techniques by using any algorithm/ softwares.
40
2.
Generate the list of the IP Addresses available in the Network with their details as follows : (a) MAC Address (b) Hostname (c) Computer Name (d) Operating System (e) Do the port scanning for at least 4 computers and define the services running on those ports.
40
OSEI-044 (P)
1
P.T.O.
3.
Install the FTP Server and find out its vulnerabilities and prepare the audit report. Apply the cross -side scripts and fetch the existing cookies generated by any website.
No. of Printed Pages : 2 OSEI-044 (P) um ADVANCED CERTIFICATE ...
No. of Printed Pages : 2. OSEI-044 (P) um ADVANCED CERTIFICATE IN INFORMATION. SECURITY. Term-End Practical Examination. June, 2015. OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions carrying. 40 marks each. (ii) Viva-voce carries 20 ...
OSEI-042 (P) : SECURING INTERNET ACCESS. Time : 3 hours. Maximum Marks : 100. Note : (a) Attempt any two out of three questions ... Browse Internet Using Google chrome and do the 40 following : (a) View the history file of this week. (b) Delete histo
(a) View the history file of this week. (b) Delete history of 24 hours. (c) Delete temporary Internet ... Visit two online banking website (s). Without logging into them, ...
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmiss
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat
... and disadvantages of 5+5 the following training aids : (i) Posters. (ii) Films. 2. Explain what is Food Safe Facility and what are 20 the key features of such facility ? 3. (a) What are the safety measures to be taken 10 by the following to ensur
registry, and take the snapshot. Then remove the folder and then revert the registry entries and take another snapshot and finally generate the comparison report of the snapshots. 40. 3. Do the website auditing of http: SedulityGroups.in and generate
Yeast grow best under slightly medium. (ii) Bacterial food refers to food borne illness caused by the presence of a bacterial toxin formed in the food. (iii) A disease is said to be when it is common in the certain place. (iv) Free flowing salt has a
I CIC-05. No. of Printed Pages : 8 ... You cannot close MS-Word application by ... aTT.TITT -. 1 10 cam. `achC4779 t I 371k rtfq. Trt fq-*77- 31f-*7 ch. 10x2=20. 1.
the snapshot. Then remove the folder and revert the registry entries and take another snapshot. Finally generate the comparision report of the snapshot. 2. Configure windows firewall /security policies to 40 block at leasts services / ports which you
(c) Auto Style. (d) Pre - formatted. ppt. 7. To insert a new slide in the current presentation, we can choose : (a) Ctrl+M. (b) Ctrl+N. (c) Ctr1+0. (d) Ctrl+F. CIC-05. 2 ...
Dec 3, 2014 - CITL-001(P)/S3. CERTIFICATE IN INFORMATION TECHNOLOGY (CIT). Term-End Practical Examination ... (iv) Publisher. (v) Year. (vi) Category. (vii) Cost. (viii) Book Count. (b) Write HTML code to create a web form to enter the details of Boo
(ii) Difference between spelling & sound. (iii) Difference between stress and intonation. (iv) Types of questions. (b) Identify the root , prefix and suffix in the. 5 following words. unavoidable, impossibility , unwearable, implanted, irregularity.
sub ( to show location ) anti ( to show attitude) out ( to show rank) over ( to show an action which is excessive) a ( add to a verb to form an adjective). CTE-2. 2 ...
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
POST GRADUATE CERTIFICATE IN CYBER. LAW (PGCCL). 00. Term-End Examination tr). O. June, 2015. MIR-014 : PRIVACY AND DATA PROTECTION. Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat