P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination
1r)
December, 2013 MSEI-026 : BCP, DR PLANNING AND AUDIT Time : 2 hours Maximum Marks : 50 Note : Section A - Answer all the objective type questions. Section B - Answer all the very short answer type questions. Section C - Answer any two questions out of three short answer type questions. Section D - Answer any two questions out of three long questions. SECTION - A Objective type questions. (Attempt all the questions) 1.
EDI stands for (a) Electronic Data Interchange (b) Electronic Data Interchanges (c) Electronic Data Inter - charged (d) None of these
1
2.
A is more specific to information system. It is the amount of data that can be lost measured by a time index.
1
3.
can be defined as " Phenomena that pose a threat to people , structures , or economic assets and which may cause a disaster. They could be either manmade or naturally occuring in our environment".
1
MSEI-026
1
P.T.O.
4.
In JRD session, "JRD" stands for "Joint Requirements Development". (b) False (a) True
1
5.
ITSCM stands for Information Technology Service Continuity Management. (b) False (a) True
Risk identification will be the first step determining which risk may affect a project. (a) True (b) False SECTION - B Very short type questions. (Attempt all the questions)
11.
Explain the purpose of Risk Analysis ?
2
12.
What is firewall ?
2
13. Define Opportunity ? Differentiate Risk and Opportunity.
2
14. What do you mean by threats in business 2 continuity ? 15.
What are the objectives of crisis management ?
MSEI-026
2
2
SECTION - C Short answer type questions. (Attempt two out of three questions) 16.
What are the different methods to reduce the impact of risk?
5
17.
Write a short note on project management.
5
18.
Explain the tools of windows recovery 5 environment. SECTION - D Long answers type questions. (Attempt two out of three questions)
19.
What is disaster? Explain types of disaster. What do you understand by DMP?
10
20.
Explain the concept of Decision Tree and BCM.
10
21.
Write a short note on the following : (a) System Crash (b) HAZOP (c) FMEA/FMECA (d) Privilege Attack (e) Motion Detectors
ITSCM stands for Information Technology Service 1. Continuity Management. (a) True. (b) False. 6. In BCP and ... What is firewall ? 2. 13. Define Opportunity ? Differentiate Risk and 2. Opportunity. 14. What do you mean by threats in business 2 continuity ? 15. What are the objectives of crisis management ? 2. MSEI-026. 2 ...
... questions out of three short answer type questions. Section D â Answer any two questions out of three long answer type questions. SECTION A. Attempt all the following questions. 10x1=10. 1. is one where the suspect operating system is still run
commercial farming. 6. (a) Which institutions are called the Bretton 10. Woods Trio ? Explain. (b) Discuss the differential impact of 10 globalization on women. 7.
commercial farming. 6. (a) Which institutions are called the Bretton 10. Woods Trio ? Explain. (b) Discuss the differential impact of 10 globalization on women. 7.
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION
RESOURCE MANAGEMENT. Time : 3 hours. Maximum Marks : 100. Note : Answer any five of the following questions. All questions carry equal marks. 1. Explain the role of women's collectives in 20 accessing and preserving forests with suitable examples dra
What do you understand by Primary Agricultural. Cooperative Societies (PACS) ? 17. What are the objectives and functions of District. Central Cooperative Bank ...
7. Given below is the data related to number of male and female students who have passed or failed nutrition test. 10+10. Pass. Fail. Female. 30. 20. Male. 25.
Term-End Examination. December, 2013. MPYE-001 : LOGIC. Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all five questions. (ii) All questions carry equal marks. (iii) Answers to question no. 1 and 2 should be in about. 500 words each. 1. Expl
MASTER OF SCIENCE (DIETETICS AND. FOOD SERVICE MANAGEMENT). Term-End Examination. December, 2013. MFN-009 : RESEARCH METHODS AND. BIOSTATISTICS. Time : 3 hours. Maximum Marks : 100. Note : Question No. 1 is compulsory. Answer five questions. 1. (a) D
amount of video RAM in mega bytes that the computer must have to support the above mentioned resolutions and number of colours ? (b) Plot a circle at (5, ...
Next year we (i) (visit) the forts of Rajasthan. We are sure we (j) (enrich) ourselves with the glorious history of Indian forts and the ancient culture. 5. The following ...
December, 2013. MHI-01 : ANCIENT AND MEDIEVAL. SOCIETIES. Time : 3 hours. Maximum Marks : 100. Note : Answer any five questions in about 500 words ... 41k-rtd fa-ccifor$ friftrI. 10+10. (a) yr-Ilqiui. 3-1177. (b) fug (Egypt). (c) 34TIITT11 -114A1,-4.
Time Allowed : 2 Hours. Maximum Marks : 50. (Practical Work : 40. Viva Voce : 10). (Weightage : 40%). General Instructions : (i). Attempt all the questions. (ii). Show the output to your examiner. (iii). Save your output in your system which will be
... notes on all of the following : (a) Hypothyroidism. 5. (b) Recurrent urinary tract infection. 5. (c) Herpez Zoster. 5. (d) Hyponatremia. 5. (e) Menopause in females.
government of India to ensure land rights for women. 6. Discuss the Forest Rights Act 2006 in the context 20 of livelihoods and food security for the scheduled.
(a) Suspense in detective stories. (b) The role of illustrations in children's books. (c) The figure of the anti-hero. 2. Discuss the significance of the climax in a short.
2. (a) Cyber bullying. (b) Data theft. 17. Explain the major characteristics of white collar economic crimes. 5. 18. Explain the background of botnets. 5. MSEI-027.
Define various encryption. 5 terms used. SECTION - D. (Attempt 2 out of 3 long type questions.) 7. With the help of neat diagram, briefly explain the 10 types of fire walls. 8. Explain Network Layer Attack. Discuss packnet 10 sniffing in detail. 9. D
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
(d) Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and ...