ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
O
Term-End Examination
O
June, 2015 OSEI-044 : SERVER SECURITY Maximum Marks : 50
Time : 2 hours
Note : (i)
Section - 'A' answer all the objective type questions.
(ii) (iii) (iv)
Section - 'B' answer all the very short answer type questions. Section - 'C' answer 2 out of 3 short answer type questions. Section - 'D' answer 2 out of 3 long questions.
SECTION - A (Attempt all the questions)
1x10=10
1.
is a free and open - source Mail Transfer Agent (MTA) that routes and delivers electronic mail.
2.
refers to e-mail that appears to have originated from one source when it was actually sent from another source.
OSEI-044
1
P.T.O.
3.
is the ability of users to deny that they performed specific actions or transactions.
4.
XSHM stands for
5.
A is a piece of software that grabs information 'packets' that travel along a network.
6.
A attack is basically an act of sabotage against a service running on a port on a targeted system.
7.
A _ is a program that attempts to decrypt or otherwise disable password protection.
8.
refers to the act of a person abusing computer access, breaking into computers, or using computers without authorization.
9.
A is a program that automatically detects security weaknesses in a remote system.
10. The allows multiple processes to securely share the machine's main memory system. SECTION - B (Attempt all five very short answer type questions) 5x2=10 11. What do you understand by the term Email - Jamming ? 12. What are cookies ? OSEI-044
2
13.
Write a short note on the term linux service.
14.
What do you understand by privilege Escalation ?
15.
Write a note on Eudora Internet Mail Server.
16.
SECTION - C (Attempt 2 out of 3 short answer type questions) 2x5=10 Describe Encryption. Explain the types of Encryption.
17.
Explain the types of Wireless Network.
18.
Write a note on Kerberos and SSH. SECTION - D (Attempt 2 out of 3 long questions)
2x10=20
19.
Explain Client side and Server side technologies in detail.
20.
Write the steps to apply a patch. Explain the issues while creating software patches. Why is configuration testing of patches important ?
21.
Write short notes on the following : (a) Port forwarding and Blocking (b) User space Vs. Kernel Space (c) Configuration Tools (d) POSIX (e) Profiling
Note : (i) (ii) Section - 'B' answer all the very short answer (iii) Section ...
refers to e-mail that appears to have originated from one source when it was actually sent from another source. OSEI-044. 1. P.T.O.. Page 2. 3. is the ability of users to deny that they performed specific actions or transactions. 4. XSHM stands for. 5. A is a piece of software that grabs information 'packets' that travel along a ...
(c) Session Sniping is a measure taken by IDS. (d) SING is a GUI Scanning technique. (e) Handshake protocol is the most simplest part of SSL protocol. 2.
(d) Firewall. (e) Cryptography. 5x2=10. SECTION - C. (Attempt 2 out of 3 Short type questions) 5x2=10. 4. Briefly explain various stages of cryptography. 5. Explain the process of creating and verifying a digital signature. 6. Compare the functionali
Jan 19, 2017 - respective meetings in January 2017 (this document is also published on the CMDv website). 1. What information should be present in SPC ...
ID: A. Algebra 2 - Review for Test 4.1. Answer Section. 1. (0, 0). (0, 0) x = 2 y = -1. 2. (1/5, 0) no y-int x = 0 y = -5. 3. no x-int. (0, -2/3) x = -3 y = 0. 4. (0, 0). (0, 0).
Apr 11, 2011 - of internet capable smartphones, explain OWU's mobile solutions, .... With this OWU mobile app we will become one of the first small colleges with this type .... http://www.time.com/time/business/article/0,8599,1869169,00.html.
57, Differentiate the embolus from thrombus. Page 2 of 10 ... very-short-answer-qns-12.pdf. very-short-answer-qns-12.pdf. Open. Extract. Open with. Sign In.
18 B D D C 68 D C A B. 19 C A C B 69 C A B A. 20 A B B A 70 B D D C. 21 C A A B 71 A C C C. 22 B C D C 72 B D A B. 23 D D C C 73 C A B D. 24 A C B A 74 A B A C. 25 B B A D 75 D D C A. 26 A A B C 76 C C C B. 27 C D C B 77 D A B D. 28 D C C A 78 A B D
Guide to Worker Safety and Health in the Marijuana Industry: 2017 51. Section II: Safety and Health Program Plans. II.1 Hazard communication plan. The Hazard ...
Write short notes on any five of the following : (a) Vidushak in Kudiattam. 5x4=20. (b) Stage geography (diagram). (c) Bhagavata mela. (d) Contemporary Indian ...
should continue to reflect the full range of student abilities and talents (i.e. diverse and inclusive). 3. ESF has a strong, positive reputation within the Hong Kong ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Section III - Determining Research involving Human S ... hool - HRPP Policies and Procedures_v.10.27.2015.pd
developed in accordance with Federal regulations, New York State law, and the Office for. Human Research Protections (OHRP) Guidance documents and Frequently ... Human S ... hool - HRPP Policies and Procedures_v.10.27.2015.pdf.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Part 2 Section I ...
On the eve of the 5th anniversary of the enactment of the RTI Act, Loksatta Sanjeevani has filed an unprecedented 500 RTI applications as part of its latest ...