Note : (i) Section A - Answer all the objective type questions. (ii) Section B - Answer all very short answer type questions. (iii) Section C - Answer two out of three short answer type questions. (iv) Section D - Answer two out of three long answer type questions.
SECTION - A (Attempt all objective type questions) 1. Client/Server security includes which of the following ? (a)
Physical security
(b)
Change control security
(c)
Measures taken to secure all systems
1
(d) All of the above 2. The last address of IP address represents address. MSEI-023
1
1
P.T.O.
3. Which of the following is the benefit of the three-tier architecture ? (a) New modules can be built to support specific business needs. (b) Performance improves for compiled SQL statements. (c) Results in a thinner client and database server. (d) All of the above.
1
4.
Programs are automatically loaded and operated as a part of browser
1
5. Computers which stores the different web pages are called as
1
6.
Class decimal.
address begins with 128 to 191
1
7.
allows the database management system to uniquely identify.
1
8.
Two important languages in the database system are : (a) and (b)
1
9.
When the DBMS does a commit, the changes made 1 by the transaction are
10.
The model shows how the network 1 functions of a computer ought to be organized. (a) CCITT (b) OSI (c) ISO (d) ANSI
MSEI-023
2
SECTION - B (Attempt all the very short answer type questions) 11.
What are the different types of servers ?
2
12.
What is Remote Data Management ?
2
13.
What are the networks and security challenges ?
2
14.
What are the various categories of cyber crimes ?
2
15.
Difference between Clustering and Mirroring.
2
SECTION - C (Attempt two out of three short answer type questions) 16.
What are the privacy and security features being provided by web browsers ?
5
17.
What is meant by real client server ? Explain the types of real client server.
5
18.
What is reverse engineering ? Where can we use it ?
5
SECTION - D (Attempt two out of three long answer type questions) 19.
What is WEB 3.0 ? What will be the benefits of 10 WEB 3.0 ?
20.
Explain the shadow paging recovery technique. 10
21.
Explain in detail about extended and base services 10 of server programs.
Which of the following is the benefit of the. 1 three-tier architecture ? (a). New modules can be built to support specific business needs. (b). Performance improves for compiled SQL statements. (c). Results in a thinner client and database server. (d). All of the above. 4. Programs are automatically loaded and operated. 1.
(a) CASCO. (b) Cyber - terrorism. (c) TRIPS Agreement. (d) Cyber defamation. (e) Liability of internet service provider. 2. What is the role of certifying authority ?
5. Why we need hybrid IDSs ? 5. Give the difference between Symmetric and. 5. Asymmetric Cryptography. 6. Explain the types of digital watermarks. 5. SECTION - D. (Attempt 2 out of 3 long type questions). 7. Explain the application of Biometrics tech
is a category of computer crime that. 1 employs ... computer system. 2. ... decimal. 8. The full form of RSS in RSS feed is. 9. In certain tuples/records satisfying. 1.
Section A - Answer all the questions. Section B - Answer all the questions. Section C - Answer any three questions out of four. SECTION A. Answer all the questions. 1. Write short notes on the following : 15. (a) User Account Policy. (b) ISO 27001. (
11. What do you mean by reverse engineering ? 12. List some of major e- mail related crimes. 13. What is the use of minus (-) operator in Search engine ? 14.
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A. Answer all the questions. 1. Write short notes (any four). 12. (a) CASCO. (b) Cyber - terrorism. (c) T
Time : 2 hours. Maximum Marks : 50. Note : (i) Section - A : objective type questions. (ii) Section - B : very short answer ty pe questions. (iii) Section - C : short answer hoe questions. (iv) Section - D : long answer type questions. SECTION - A. (
P.G. DIPLOMA IN INFORMATION SECURITY. (PGDIS). CN1. Term-End ... What is cloud forensic ? 2. MSEI-027. 3 ... Explain the principles of Computer - Based. Evidence. 17. ... Explain the classification of CFCC (Cyber Frand 10 and Cyber ...
(Attempt 2 out of 3 long questions.) 19. Explain "Log File Analysis". What is "File 10. Carving" in Data recovery ? What is salvaging of data ? 20. What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS. 21. Write a
1. 3. A Recovery Time Objective (RTO) is the period of. 1 time within which systems, processes, services or functions must be recovered after an outage. (a) True.
PG Diploma in Translation & PG Diploma in Vachana St ... -15 onwards syllabus is continued to 2016-17 A.Y.pdf. PG Diploma in Translation & PG Diploma in ...
Spell out in detail the provisions of the Banking Regulation Act, 1949 pertaining to. the conditions under which the R.B.I. may extend license to a Banking ...
PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is continued to 2016-17 A.Y.PDF. PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is ...
Page 1 of 32. 1. INDIAN INSTITUTE OF MATERIALS MANAGEMENT. Post Graduate Diploma in Materials Management. Graduate Diploma in Materials Management. PAPER 12. Packaging & Distribution Management. Date: 14.06.2010 Max Marks: 100. Time: 10.00 AM to 1.00