POST GRADUATE DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination June, 2014 MSE-024 : POLICY, STANDARDS AND LAWS Maximum Marks : 70
Time : 3 hours
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A (Answer all the questions) 1.
Write short notes on (any four) : (a) Data Diddling (b) DEVCO (c) Cyber Stalking (d) Software Piracy (e) IPAB
2.
Explain the key features of Internet bill of rights.
3.
12
SECTION - B (Answer all the questions) Explain the interplay between IPR and Cyberspace.
MSE-024
1
3
5
P.T.O.
4.
Explain the Rabin signature scheme in cryptography.
5.
Explain a cryptographic protocol and entity 5 authentication protocol.
6.
How does due diligence ensure Compliance of IT 5 Act ?
7.
Explain the function of Cyber Appellate Tribunal.
8. 9.
SECTION - C (Answer any three questions out of four) Explain time stamp and how it works ? Elaborate on the classification of time stamping. Effectiveness of the ISO system being implemented depends on the some important factors. Explain these factors.
5
5
10 10
10. Cyber forensics is the need of the hour to tackle 10 cyber crimes. Do you agree and explain why ? 11.
Patent is a form of intellectual property for granting exclusive rights to inventor for their invention for a limited period of time. Elaborate on the issues related to patentability of algorithms.
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION
... questions out of three short answer type questions. Section D â Answer any two questions out of three long answer type questions. SECTION A. Attempt all the following questions. 10x1=10. 1. is one where the suspect operating system is still run
Define various encryption. 5 terms used. SECTION - D. (Attempt 2 out of 3 long type questions.) 7. With the help of neat diagram, briefly explain the 10 types of fire walls. 8. Explain Network Layer Attack. Discuss packnet 10 sniffing in detail. 9. D
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
(d) Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and ...
some school level activities, which can be infused with this model. OR. Discuss the organizational structure of vocational education and training in Australia.
Electrical Power Quality. Time: 3 hrs. Max. Marks:100. Note: Answer any FIVE ... Explain following as power quality instruments : i) Multi meters ii) Oscilloscopes.
19. What are data recovery techniques ? Generate the 10. Computer Security Audit Checklist. 20. Explain IPSec, Internet Key Exchange and 10. Kerberos. Write a short note on economical threat. 21. Explain the given terms : 10. (a) Social Engineering.
(g) Dark, firm and dry (DFD) condition is mostly found in. (h) The diseases those must be reported to public health authorities are known ... (a) What is line dressing of food animals? 2. (b) What are the advantages of line dressing? 4. (c) Briefly w
some school level activities, which can be infused with this model. ... (741-.A-1-.74.fl t di-19114-14' c11. 3111.Tffi-dT (effectiveness). cRc;tiul f\R! MESE-062. 4 ...
4. (b) Find the components of 0 under the usual metric. 2. (c) State Monotone Convergence Theorem. Verify the theorem for {fn) where fn : R â> R is defined by.
annual turnover of the company is around. Rs. 150 crores and its capacity ... the accident occurred during and in the course of employment, the Management ...
Jun 1, 2014 - (f) Tools for educational monitoring and evaluation. 4. Answer the following question in about. 600 words. Autonomy and accountability are like ...
Jun 1, 2014 - (f) Tools for educational monitoring and evaluation. 4. Answer the following question in about. 600 words. Autonomy and accountability are like ...