ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) Term-End Examination December, 2014
OSEI-042 : SECURING INTERNET ACCESS Maximum Marks : 50
Time : 2 hours Note :
Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C : Answer two out of three short answer type questions. Section D : Answer two out of three long questions. SECTION A 10x1=10
Attempt all the questions.
refers to the structure of a network including physical arrangements of devices.
1
Security incidents are usually handled by a team called
1
3.
TKIP stands for
1
4.
was designed to transport and store data, with focus on what data is.
1. 2.
OSEI-042
1
P.T.O.
5.
is a trademarked device used to wireless over short distances using short wavelength radio transmission from 2400 — 2480 MHz from fixed and mobile devices.
6.
JavaScript is a
7.
The act of breaking into computer security is termed as
8.
occurs when an attacker continually A attacks a targeted Access Point or Network with spurious requests, premature successful connection messages, failure messages and/or other commands.
9.
is a concept for the most robust way A to counteract wireless security risks.
10.
are one of the evil effects of proliferation of computers and Internet.
language.
SECTION B (Very short answer type questions) 11. Write short notes on the following : (a)
Uniform Resource Identifier
(b)
Plug ins
(c)
WSDL
(d)
Digital evidence
(e)
Digital watermarking
OSEI-042
2
5x2=10
SECTION C Attempt any two out of three short answer type 2x5=10 questions. 12. Provide the key security issues for SOAP web services.
5
13. Write the advantages and disadvantages of e-mail.
5
14. A scripting language allows control of one or more applications. Explain how.
5
OSEI-042
3
P.T.O.
SECTION D Attempt any two out of three long answer type 2x10=20 questions. 15. Optimizing Firewall security is an art unto itself. Do you agree ? Explain in detail.
10
16. Cyber crime harms financially to both customers and businesses. Explain what measures you will take to protect customers and businesses from such cyber crime.
10
17. Explain the different milestones in the development of the Internet and its significance for education.
OSEI-042 No. of Printed Pages : 4 ADVANCED CERTIFICATE IN ...
December, 2014. OSEI-042 : SECURING INTERNET ACCESS. Time : 2 hours. Maximum Marks : 50. Note : Section A : Answer all the objective type questions. Section B : Answer all the very short answer type questions. Section C ... wavelength radio transmission from. 2400 â 2480 MHz from fixed and mobile devices. 6.
SECTION C. Attempt any two out of three short answer type questions. 2x5=10. 12. Provide the key security issues for SOAP web services. 5. 13. Write the advantages and disadvantages of e-mail. 5. 14. A scripting language allows control of one or more
Yeast grow best under slightly medium. (ii) Bacterial food refers to food borne illness caused by the presence of a bacterial toxin formed in the food. (iii) A disease is said to be when it is common in the certain place. (iv) Free flowing salt has a
r r -1:cr l r, 10 Tzt I 9z-1 9 . wrrrq -Etr-ffuff -vrff Tzt 4;1. I TITIFTft t mil)k-7-4T. )0I- -terT*74 Yid. IR I. (q) 111:1T7 p1T 2IT 13. T -g3TE rig t-u trTdT 2TT Feb 3Tcrq 3TK1 ...
I CIC-05. No. of Printed Pages : 8 ... You cannot close MS-Word application by ... aTT.TITT -. 1 10 cam. `achC4779 t I 371k rtfq. Trt fq-*77- 31f-*7 ch. 10x2=20. 1.
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat
... and disadvantages of 5+5 the following training aids : (i) Posters. (ii) Films. 2. Explain what is Food Safe Facility and what are 20 the key features of such facility ? 3. (a) What are the safety measures to be taken 10 by the following to ensur
(c) Auto Style. (d) Pre - formatted. ppt. 7. To insert a new slide in the current presentation, we can choose : (a) Ctrl+M. (b) Ctrl+N. (c) Ctr1+0. (d) Ctrl+F. CIC-05. 2 ...
registry, and take the snapshot. Then remove the folder and then revert the registry entries and take another snapshot and finally generate the comparison report of the snapshots. 40. 3. Do the website auditing of http: SedulityGroups.in and generate
OSEI-042 (P) : SECURING INTERNET ACCESS. Time : 3 hours. Maximum Marks : 100. Note : (a) Attempt any two out of three questions ... Browse Internet Using Google chrome and do the 40 following : (a) View the history file of this week. (b) Delete histo
(a) View the history file of this week. (b) Delete history of 24 hours. (c) Delete temporary Internet ... Visit two online banking website (s). Without logging into them, ...
No. of Printed Pages : 2. OSEI-044 (P) um ADVANCED CERTIFICATE IN INFORMATION. SECURITY. Term-End Practical Examination. June, 2015. OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three question
(ii) Difference between spelling & sound. (iii) Difference between stress and intonation. (iv) Types of questions. (b) Identify the root , prefix and suffix in the. 5 following words. unavoidable, impossibility , unwearable, implanted, irregularity.
sub ( to show location ) anti ( to show attitude) out ( to show rank) over ( to show an action which is excessive) a ( add to a verb to form an adjective). CTE-2. 2 ...
the snapshot. Then remove the folder and revert the registry entries and take another snapshot. Finally generate the comparision report of the snapshot. 2. Configure windows firewall /security policies to 40 block at leasts services / ports which you
POST GRADUATE CERTIFICATE IN CYBER. LAW (PGCCL). 00. Term-End Examination tr). O. June, 2015. MIR-014 : PRIVACY AND DATA PROTECTION. Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii
crop cultivation and livestock rearing in order to ensure food safety. (d) What are the most commonly used modes 5 for consumer education programmes ? 3.
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp