P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination December, 2015 MSEI-022 : NETWORK SECURITY Time : 2 hours Note :
1.
Maximum Marks : 50
(i) Section - A - Answer all the objective type questions. (ii) Section - B - Answer all the very short answer type questions. (iii) Section - C - Answer any two question out of three. (iv) Section - D - Answer any two question out of three long type questions.
SECTION - A (Attempt all the questions) Write True or False.
5x1=5
(a)
A Key - logger is a small hardware device or a program that monitor each keystroke a user types on the computer's keyboard.
(b)
A firewall is a device with set of rules to permit ordinary network access by unauthorized services.
(c)
TCP/IP hijacking is successful because protocols, such as File Transfer Protocol (FTP) and Telnet, do not check the source IP addresses of the device from which they receive packets.
MSEI-022
1
P.T.O.
2.
(d)
Hardware firewalls usually are located inside the network security perimeter as the last line of defense.
(e)
Malware is simply an Web-advertisement and does not pose substantial risk to large organizations.
5x1=5
Fill in the blanks : (a)
is a trap set to detect, deflect A or in some manner counteract attempts at unauthorized use of information system.
(b)
Full form of MAP is
(c)
The signal where the watermark is to be embedded is called the
(d)
is a secret - key network authentication service developed at MIT by Project Athena.
(e)
is a mathematical scheme for A demonstrating the authenticity of a digital message or document.
SECTION
-
B
(Attempt all the questions) 3.
Write short notes on the following : (a)
Next Generation Networks
(b)
Hash function
(c)
Trojan horses
(d)
E-mail Spoofing
(e)
Dictionary attack
MSEI-022
2
5x2=10
SECTION - C
4.
(Attempt 2 out of 3 short type questions) Describe the types of IDSs and their limitations. Why we need hybrid IDSs ?
5.
Give the difference between Symmetric and Asymmetric Cryptography.
5
6.
Explain the types of digital watermarks.
5
5
SECTION - D
7.
(Attempt 2 out of 3 long type questions) Explain the application of Biometrics technology 10 in detail.
8.
What is an authentication mechanism ? Explain 10 in detail.
9.
Explain the role of a firewall in securing the 10 network. Describe different types of firewalls.
5. Why we need hybrid IDSs ? 5. Give the difference between Symmetric and. 5. Asymmetric Cryptography. 6. Explain the types of digital watermarks. 5. SECTION - D. (Attempt 2 out of 3 long type questions). 7. Explain the application of Biometrics technology 10 in detail. 8. What is an authentication mechanism ? Explain 10.
(a) CASCO. (b) Cyber - terrorism. (c) TRIPS Agreement. (d) Cyber defamation. (e) Liability of internet service provider. 2. What is the role of certifying authority ?
Which of the following is the benefit of the. 1 three-tier architecture ? (a). New modules can be built to support specific business needs. (b). Performance improves for compiled SQL statements. (c). Results in a thinner client and database server. (
is a category of computer crime that. 1 employs ... computer system. 2. ... decimal. 8. The full form of RSS in RSS feed is. 9. In certain tuples/records satisfying. 1.
Section A - Answer all the questions. Section B - Answer all the questions. Section C - Answer any three questions out of four. SECTION A. Answer all the questions. 1. Write short notes on the following : 15. (a) User Account Policy. (b) ISO 27001. (
11. What do you mean by reverse engineering ? 12. List some of major e- mail related crimes. 13. What is the use of minus (-) operator in Search engine ? 14.
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A. Answer all the questions. 1. Write short notes (any four). 12. (a) CASCO. (b) Cyber - terrorism. (c) T
Time : 2 hours. Maximum Marks : 50. Note : (i) Section - A : objective type questions. (ii) Section - B : very short answer ty pe questions. (iii) Section - C : short answer hoe questions. (iv) Section - D : long answer type questions. SECTION - A. (
P.G. DIPLOMA IN INFORMATION SECURITY. (PGDIS). CN1. Term-End ... What is cloud forensic ? 2. MSEI-027. 3 ... Explain the principles of Computer - Based. Evidence. 17. ... Explain the classification of CFCC (Cyber Frand 10 and Cyber ...
(Attempt 2 out of 3 long questions.) 19. Explain "Log File Analysis". What is "File 10. Carving" in Data recovery ? What is salvaging of data ? 20. What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS. 21. Write a
1. 3. A Recovery Time Objective (RTO) is the period of. 1 time within which systems, processes, services or functions must be recovered after an outage. (a) True.
PG Diploma in Translation & PG Diploma in Vachana St ... -15 onwards syllabus is continued to 2016-17 A.Y.pdf. PG Diploma in Translation & PG Diploma in ...
Spell out in detail the provisions of the Banking Regulation Act, 1949 pertaining to. the conditions under which the R.B.I. may extend license to a Banking ...
PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is continued to 2016-17 A.Y.PDF. PG Diploma in Ambedkar Studeis 2014-15 onwards syllabus is ...
Page 1 of 32. 1. INDIAN INSTITUTE OF MATERIALS MANAGEMENT. Post Graduate Diploma in Materials Management. Graduate Diploma in Materials Management. PAPER 12. Packaging & Distribution Management. Date: 14.06.2010 Max Marks: 100. Time: 10.00 AM to 1.00