No. of Printed Pages : 3

OSEI-041

ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE) Term-End Examination

O

June, 2014 OSEI-041 : INFORMATION SECURITY Maximum Marks : 50

Time : 2 hours Note :

Section 'A' - Answer all the objective type questions. Section 'B' - Answer all the very short answer type questions. Section 'C' - Answer any two questions out of three short answers type questions. Section 'D' - Answer any two questions out of three long answers type questions.

SECTION-A Objective type questions. (Attempt all the questions) 1.

GID stands for (a) Group Identification (b) Group Integrated Devices (c) Graphico Intrusion Detection (d) Google ID

1

2.

In DoS Attack, "DoS" stands for "Denial of Services". (b) False (a) True

1

OSEI-041

1

P.T.O.

3.

Static analysis involves going through the code in order to find out any possible error/defect in the code. (a) True (b) False

4. 5.

is the range of well known ports. EFS stands for

1

1 1

6. ARPANET stands for

1

7.

RAT stands for (a) Recover Admin Tool (b) Recover Assessment Tool (c) Recovery Artificial Technology (d) Remote Administration Tool

1

8.

NAT stands for Network Address Translator. (a) True (b) False

1

9.

command is used for setting up the passkey in UNIX operating system.

10. UAC stands for

1

SECTION-B Very short answer type questions. (Attempt all the questions) 11. Explain "Virtualization".

2

12. What is Fragmentation ?

2

13. What are Antivirus and Worms ?

2

OSEI-041

2

14.

Write a short note on Snapshot.

2

15.

How Software Security is threatened ?

2

SECTION-C Short Answers type questions (Attempt 2 out of 3 questions) 16.

Discuss approved network traffic and write a short note on Storage Security and Physical Memory.

5

17.

Explain how port scanner is different from vulnerability scanner tool.

5

18.

What are the causes of Software Piracy ?

5

SECTION-D Long Answers type questions. (Attempt 2 out of 3 questions) 19.

What are data recovery techniques ? Generate the Computer Security Audit Checklist.

10

20.

Explain IPSec, Internet Key Exchange and Kerberos. Write a short note on economical threat.

10

21.

Explain the given terms : (a) Social Engineering (b) Network Attacks (c) PC Audit (d) Adware (e) SSL

10

OSEI-041

3

(ACISE) Term-End Examination June, 2014 OSEI-041

19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering. (b) Network Attacks. (c) PC Audit. (d) Adware. (e) SSL. OSEI-041. 3.

23KB Sizes 0 Downloads 227 Views

Recommend Documents

(ACISE) Term-End Examination June, 2015 OSEI-041
(c) event viewer. (d) message screen. 8. To recover files from a backup, you perform a. 1. (a) restore. (b) scan. (c) unerase. (d) copy. 9. The prevents unlawful access to voice 1 communications by wire. (a) Electronic Communications Privacy Act. (b)

(ACISE) c:D Term-End Practical Examination June, 2016 OSEI-044
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co

(PGDIS) Term-End Examination June, 2014
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION

(PGDIS) Term-End Examination June, 2014
POST GRADUATE DIPLOMA IN. INFORMATION SECURITY (PGDIS). Term-End Examination. June, 2014. MSE-024 : POLICY, STANDARDS AND LAWS.

ACISE
Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short answer type questions. Section-D : Answer 2 out of 3 long questions. SECTION - A. (Attempt all the questions) ... attack involves firing a SQL query via the

ACISE
A stateful firewall maintains a. 1 which is a list of active connections. (a) routing table. (b) bridging table. (c) state table. (d) connection table. 2. NTFS stands for. 1. 3. VOIP stands for. 1. OSEI-041. 1. P.T.O.. Term-End Examination. June, 201

ACISE
Risk assessment is the various techniques which. 1 minimise the risk to other people. (a) True. (b) False. 6. is the network of networks spread. 1 across the globe ...

ACISE
Section D : Answer 2 out of 3 long answer type questions. SECTION - A. ( Attempt all the questions ). 1x10=10. 1. A file that lists the actions that have occurred is called a file. 2. RSA is key cryptosystem. 3. User can create their own tags using.

ACISE
18. Write the different methods used to detect and 5 prevent the cyber-attack. SECTION - D. (Attempt two out of three long answer type questions.) 19. How to prevent and report credit card fraud or 10 identify theft ? 20. What is Phishing ? How it wo

ACISE
OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : Section-A : Answer all questions. Section-B : Answer all very short answer type questions. Section-C : Answer 2 out of 3 short ... attack involves firing a SQL query via the input

Term-End Examination June, 2014 MESE-062 : VOCATIONAL ...
some school level activities, which can be infused with this model. OR. Discuss the organizational structure of vocational education and training in Australia.

Eighth Semester B.E. Degree Examination, June / July 2014 Electrical ...
Electrical Power Quality. Time: 3 hrs. Max. Marks:100. Note: Answer any FIVE ... Explain following as power quality instruments : i) Multi meters ii) Oscilloscopes.

Term-End Examination June, 2014 BPVI-005
1. (iv) LD50. -cR trftqfti-ff t. 2. (v). 4eiltI. -. D-ti-i ti,. TRT itiifrff f+-Trr. 1. Quo' t- 1. (vi) SO2 aft. Tq7:r. AR. (..) fir. \Aim *1. (vii) 11=r-z. 3-f-d7 co -cm f=4-s3#. TzrTz . `"rf'-7.

ACISE
Write short notes (mainly in 4 - 5 lines) on the following : 4x3=12. (a) Certification. (b) Information Security. (c) Electronic evidence. (d) Hacking. SECTION - B. (Answer all the questions). 3. Explain the privacy concerns on cookies. 5. 4. Explain

Term-End Examination June, 2014 BPVI-022
(g) Dark, firm and dry (DFD) condition is mostly found in. (h) The diseases those must be reported to public health authorities are known ... (a) What is line dressing of food animals? 2. (b) What are the advantages of line dressing? 4. (c) Briefly w

MA DISTANCE EDUCATION Term-End Examination June, 2014 MDE ...
M.A. DISTANCE EDUCATION. Term-End Examination. 1-r). June, 2014. O. C. MDE-412 : INSTRUCTIONAL DESIGN. For students of January 2012 and Onwards.

MA DISTANCE EDUCATION Term-End Examination June, 2014 MDE ...
M.A. DISTANCE EDUCATION. Term-End Examination. 1-r). June, 2014. O. C. MDE-412 : INSTRUCTIONAL DESIGN. For students of January 2012 and Onwards.

JUNE 2014
THE PEORIA CATHOLIC HIGH SCHOOL PARENT NEWSLETTER .... “Geniverse is free, web-based software for high school Biology that engages students in ...

June 2014
1863. AFW-1(E)/BHDA-101/AFW-1(H). Total No. of Questions : 5+5]. [Total No. of Printed Nes 4. BACHELOR'S DEGREE PROGRAMME. Term-End Examination.

June 2014
some school level activities, which can be infused with this model. ... (741-.A-1-.74.fl t di-19114-14' c11. 3111.Tffi-dT (effectiveness). cRc;tiul f\R! MESE-062. 4 ...

June 2014
4. (b) Find the components of 0 under the usual metric. 2. (c) State Monotone Convergence Theorem. Verify the theorem for {fn) where fn : R —> R is defined by.

June 2014
CS-75 : INTRANET ADMINISTRATION. Time : 2 hours ... (a) What is WAP (Wireless Application 5 protocol) ? ... (c) What is Virtual Private Network ? Explain. 5.

June 2014
Term-End Examination. June, 2014. MVP -002 : PG ... (iii) Warehousing. (iv) Tariff Value. ... under this Act. (b) Discuss 3 categories of licences which were 3+2=5.

June 2014
BACHELOR OF COMPUTER APPLICATIONS. Cr). (PRE - REVISED) cr). Term-End Examination. June, 2014. CS- 74 : INTRODUCTION TO INTERNET.