POST GRADUATE DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination December, 2014 MSE-024 : POLICY, STANDARDS AND LAWS Maximum Marks : 70
Time : 3 hours Note : Section A - Answer all the questions. Section B - Answer all the questions.
Section C - Answer any three questions out of four. SECTION A Answer all the questions. 1. Write short notes on the following : (a)
User Account Policy
(b)
ISO 27001
(c)
Electronic records
(d)
Key establishment
(e)
Computer related offences
MS E-024
1
15
P.T.O.
SECTION B Answer all the questions. 2.
Explain the salient features of the Information Technology Amendment Act, 2008.
5
Define Entity Authentication Protocol and its types.
5
4.
What is software piracy ? Is it a crime ?
5
5.
What are digital signatures ? Write its uses.
5
6.
Do you think that Cyber Appellate Tribunal has the same powers as are vested in a civil court ?
5
3.
MSE-024
2
SECTION C Answer any three questions out of four. 7.
8.
"As a result of the extent to which Information Technology has become an integral part of the way in which businesses operate, the appropriate review of Information Technology during a due diligence project is essential." Explain this statement in detail.
10
"Patent is a form of intellectual property for granting exclusive rights to inventors for their inventions for a limited period of time." Elaborate on the issues related to patentability of algorithms.
10
Explain the role of cyber forensics in tackling cyber crimes.
10
10. Explain the contribution of ISO standards in the world.
POST GRADUATE DIPLOMA IN INFORMATION SECURITY (PGDIS ...
Section A - Answer all the questions. Section B - Answer all the questions. Section C - Answer any three questions out of four. SECTION A. Answer all the questions. 1. Write short notes on the following : 15. (a) User Account Policy. (b) ISO 27001. (c) Electronic records. (d) Key establishment. (e) Computer related offences.
(a) CASCO. (b) Cyber - terrorism. (c) TRIPS Agreement. (d) Cyber defamation. (e) Liability of internet service provider. 2. What is the role of certifying authority ?
Note : Section 'A'-Answer all the questions. Section 'B'-Answer all the questions. Section 'C'-Answer any three questions out of four. SECTION - A. Answer all the questions. 1. Write short notes (any four). 12. (a) CASCO. (b) Cyber - terrorism. (c) T
is a category of computer crime that. 1 employs ... computer system. 2. ... decimal. 8. The full form of RSS in RSS feed is. 9. In certain tuples/records satisfying. 1.
Which of the following is the benefit of the. 1 three-tier architecture ? (a). New modules can be built to support specific business needs. (b). Performance improves for compiled SQL statements. (c). Results in a thinner client and database server. (
5. Why we need hybrid IDSs ? 5. Give the difference between Symmetric and. 5. Asymmetric Cryptography. 6. Explain the types of digital watermarks. 5. SECTION - D. (Attempt 2 out of 3 long type questions). 7. Explain the application of Biometrics tech
11. What do you mean by reverse engineering ? 12. List some of major e- mail related crimes. 13. What is the use of minus (-) operator in Search engine ? 14.
1. 3. A Recovery Time Objective (RTO) is the period of. 1 time within which systems, processes, services or functions must be recovered after an outage. (a) True.
(Attempt 2 out of 3 long questions.) 19. Explain "Log File Analysis". What is "File 10. Carving" in Data recovery ? What is salvaging of data ? 20. What is Intrusion Detection System ? How does 10 it different from firewall ? Define IPS. 21. Write a
Answer the following question in about. 600 words. Discuss the government initiatives for the development of Early Childhood Care and. Education (ECCE) in India. OR. "Preschool education strengthens child's social competencies". Do you agree with the