ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) Term-End Examination December, 2012
00982
OSEI-044 : SERVER SECURITY Maximum Marks : 50
Time : 2 hours
Section-A :Answer all the objective type questions. Section-B :Answer all the very short answer type questions. Section-C :Answer 2 out of 3 short answer type questions. Section-D :Answer 2 out of 3 long questions.
SECTION - A (Attempt all the questions)
1x10=10
1.
used by some civil rights activists is an attempt to thwart government spy networks such as ECHELON.
2.
is a set of rules and specifications An for software programs to communicate with each other.
3.
The process schedular controls the process access to
OSEI-044
1
P.T.O.
4.
The Linux system was developed by a large number of
5.
A network is classed, based on the scope of the network.
6.
is an EAP type that is used in certificate - based security environment.
7.
data from physically damaged hardware can involve multiple techniques.
8.
In some, cases data on a hard drive can be unreachable due to damage to the
9.
data recovery is yet another method to restore the lost or deleted data.
10.
A developer may corrupt the software or unintentionally.
OSEI-044
2
SECTION - B (Attempt all 5 very short answer type questions) (Attempt all the questions) 11.
What is MAC spoofing ?
12.
What are temporary internet files ?
13.
Describe the term packet filtering.
14.
What is buffer overflow attack ?
15.
Discuss access point monitoring.
OSEI-044
3
5x2=10
SECTION - C (Attempt 2 out of 3 short answer type questions) 2x5=10 16.
Describe the terms computer systems security and system security attacks.
17.
Write a note on windows hacking.
18.
Discuss the issues with open source linux.
OSEI-044
4
P.T.O.
SECTION - D (Attempt 2 out of 3 long questions)
2x10=20
19.
Write a descriptive note on wireless security best practices.
20.
Write a note on software standards specifications and software code comment requirements.
21.
Discuss in detail the essentials of patch management policy and practices. Also discuss prioritization and scheduling.
What is MAC spoofing ? 12. What are temporary internet files ? 13. Describe ... OSEI-044 3. Page 3 of 5. Main menu. Displaying Server Security.pdf. Page 1 of 5.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. dhcp server ...
Department of Computer Science and Information Technology ... SYSTEMâ in partial fulfillment of the requirements for the degree of ... the period of last three and half years. .... CHAPTER 2: REQUIREMENT AND FEASIBILITY ANALYSIS .
server 60 has, for example, a database such as title informa tion of commercially .... A data base in Which the additional information for the music data mentioned ...
... was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf server. pdf server.
Page 3 ... flow will be call by the action system. Trigger On ... need only few things to configure and tiny will send the email very quickly and in easy way. Even.
Certificate error reports may contain private information. For ex- ample, a certificate from an intranet might ... example, if the user's local system clock is set incorrectly, it may prevent a report about the condition from ...... droid, accounting
HTTPS connection and replaces the certificate chain with one that the client cannot validate. Our pipeline classifies the following types of network errors: 4.3.1 Captive portal errors. Airport, hotel, and enterprise net- works often block access to
... of the apps below to open or edit this item. blade server vs rack server pdf. blade server vs rack server pdf. Open. Extract. Open with. Sign In. Main menu.
server keyword supplied.Hp universal print driver for windows xp. Sony vaio pro 13 driver windows 7.Driver hp photosmart b109nwireless.Canon pixmaip1200 ...
An interface between web servers and their. clients is termed ... Discuss buffer overrun in Windows Kernel. message ... Displaying Server Security.pdf. Page 1 of 5.
analyzing and designing enterprise-wide solutions have been used by large corpora- ... I will carefully review your comments and share ..... Although this is not an exhaustive list, a manifest con- tains. ⢠Assembly name. ⢠Version. ⢠Files in
Introduction. A Proxy Server is a medium in which users within the LAN can gain access to the Internet efficiently and much more securely. The proxy server acts ...
File: Pdf terminal server. Download now. Click here if your download doesn't start automatically. Page 1 of 1. pdf terminal server. pdf terminal server. Open.
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. HP Server rack.pdf. HP Server rack.pdf. Open. Extract. Open with.
Page 1 of 1. File: Sme server pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. sme server pdf. sme server pdf. Open. Extract. Open with. Sign In. Main menu. Displaying sme server pdf. Page 1 of 1.