I MSEI-025 I

No. of Printed Pages : 4

P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination

•c:1" ti'r)

June, 2016 MSEI-025 : APPLICATION AND BUSINESS SECURITY DEVELOPMENTS Maximum Marks : 50

Time : 2 hours

Note : (i) Section A - Objective type questions. (ii) Section B - Very short answer type questions. (iii) Section C - Short answer type questions. (iv) Section D - Long answer type questions.

SECTION - A (Attempt all the questions)

10x1=10

1. Which statement is true ? (a) An XML document can have one root element. (b) An XML document can have one child element. (c) XML elements have to be in lower case. (d) All of the above

2.

Choose the correct HTML tag for the largest heading ? (a)

(b)

(c) (d)

MSEI-025

1

P.T.O.

3. In computer security means that computer system assets can be modified only by authorized parties. (a) Confidentiality (b) Integrity (c) Availability (d) Authenticity 4. Which of the following malicious program do not replicate automatically ? (a) Trojan Horse (b) Virus (c) Worm (d) Zombie 5. The types of threats on the security of a computer system or network are : (i) Interruption (ii) Interception (iii) Modification (iv) Creation (v) Fabrication (a) (i), (iii) and (iv) only (b) (iv) and (v) only (c) (i), (ii), (iii) and (v) only (d) All 6.

IP Sec is designed to provide the security at the : (a) Transport layer (b) Application layer (c) Network layer (d) Session layer

7. Which of the following is/are protocol/s of Application ? (a) FTP (b) DNS (c) Telnet (d) All of the above

MSEI-025

2

8. Which of the following does not use a cryptographical technique to protect data ? (a) The use of digital signatures (b) Data Encryption (c) The use of stored encrypted password files (d) Using asymmetric keys at sender and receiver nodes 9. PGP encrypts data by using a block cipher called : (a) IDEA (b) Private data encryption algorithm (c) Internet data encryption algorithm (d) None 10. Gathering information by what users enter on their keyboards, especially login names and passwords is known as : (a) Dumpster Diving (b) Shoulder Surfing (c) Piggy Backing (d) Password Hashing SECTION - B (Attempt all the questions) 11.

Write the difference between White Hacker, Black Hacker and Grey Hacker.

2

12.

What is CIA (Confidentiality, Integrity and Availability) ?

2

13.

Explain symmetric cryptography algorithm.

2

14.

Write the difference between XML and HTML.

2

15.

What is XSS ?

2

MSEI-025

3

P.T.O.

SECTION - C (Attempt 2 out of 3 questions) 16.

Explain HTTP, HTTPS and TCP.

5

17.

Define Buffer overflow attack and how to prevent from it ?

5

18.

Explain Black Box Testing and White Box Testing.

5

SECTION - D (Attempt 2 out of 3 questions) 19.

Explain the flow of transaction in SCT with 10 diagram.

20.

What is malicious program ? Write the types of malicious programs and explain them.

21.

Write short notes on the following : (a) IP spoofing (b) PKI (c)

Phishing

(d) (e)

Dumpester Diving Keyloggers

MSEI-025

4

10

5x2=10

Application and business Security developments.PDF

(b) Shoulder Surfing. (c) Piggy Backing. (d) Password ... Page 3 of 4. Main menu. Displaying Application and business Security developments.PDF. Page 1 of 4.

42KB Sizes 0 Downloads 174 Views

Recommend Documents

Web application security frame
Feb 14, 2006 - tion environment to determine the application type, for example ... intelligence (AI) component that infers an action that a user ...... Files, paths,.

Web application security frame
Feb 14, 2006 - web application security frame component can be applied to. Chen et a1' ...... attacker successfully gains access as a legitimate user or host,.

PDF Improving Web Application Security: Threats and ...
Online PDF Improving Web Application Security: Threats and Countermeasures (Patterns Practices), Read PDF Improving Web Application Security: Threats ...

Integrity and Security of the Application Level Active ...
project ANDROID (Active Network Distributed Open. Infrastructure Development). In this context, we discuss the candidate approach to managing the integrity ...

Integrity and Security of the Application Level Active ...
phone: +44 20 7679 3198; email: {oprnjat | tolukemi | iliaboti | lsacks}@ee.ucl.ac.uk. Abstract .... and a Quality of Service (QoS) enabled Internet Protocol. (IP) based network. .... This section deals with more specific security issues in the ALAN 

Advanced Android Application Security Case Studies - GitHub
Flanker. KEEN TEAM. Advanced Android Application Security Case Studies ... Give a basic description of Android Security Mechanism. Vulnerability ... Page 10 ...

Expert-Oracle-Application-Express-Security-Scott-Spendolini.pdf
[zatmit.com]Expert-Oracle-Application-Express-Security-Scott-Spendolini.pdf. [zatmit.com]Expert-Oracle-Application-Express-Security-Scott-Spendolini.pdf.

[zatmit.com]Expert-Oracle-Application-Express-Security-Scott ...
Expert Oracle Application Express Security. Copyright © 2013 by ... Page 3 of 285. [zatmit.com]Expert-Oracle-Application-Express-Security-Scott-Spendolini.pdf.

Increasing Auditability in Web Application Security - IJEECS
suffer native vulnerabilities due to their architecture and also due to the fact that they are exposed to a wider audience. There are two main types of attacks facing web ... e-Commerce web application as opposed to a conventional software system. Th

Application Layer Transport Security Cloud Platform
and transport encryption system developed by Google and typically used .... identity. All communications between services are mutually authenticated. ALTS is designed to be a highly reliable, trusted system that allows for service-to- ..... attacker

Application Layer Transport Security Cloud Platform
transport encryption system that runs at the application layer, to protect RPC ... identity. All communications between services are mutually authenticated. ALTS is designed to be a highly reliable, trusted system that allows for service-to- ..... If

Increasing Auditability in Web Application Security - IJEECS
generate supplementary logs of database activity and user ... Monitoring, Risk assessment, Contingency. Threats can be from the .... malicious activity. Logs have evolved to contain information related to many different types of events occurring with

Enhance Security and Usability Security and Usability Security and ...
Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authenticati

Business Application Form.pdf
Page 1 of 2. Page 1 of 2. Page 2 of 2. Page 2 of 2. Business Application Form.pdf. Business Application Form.pdf. Open. Extract. Open with. Sign In. Main menu.

MEMBER BUSINESS LOAN APPLICATION INSTRUCTIONS
... that administers our compliance with this law is the National Credit Union Administration, Office of Consumer Protection (OCP), 1775 Duke St., Alexandria, VA ...

Polycom® Proxias™ Application Server and Application Development ...
A key element in Polycom's scalable IMS-compliant architecture, the Proxias application server works in conjunction with the Polycom InnoVox® 4000IP media ...

Polycom® Proxias™ Application Server and Application Development ...
A key element in Polycom's scalable IMS-compliant architecture, the Proxias application server works in conjunction ... modifiable, with automatic detection of new ... Linux® operating system. • JBoss Enterprise Middleware. • JAIN SIP Interface.