P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination June, 2015 MSEI-022 : NETWORK SECURITY Time : 2 hours
Maximum Marks : 50
Note : (i) Section - A Answer all the objective type questions. (ii) Section - B Answer all the very short answer type questions. (iii)Section - C Answer any two question out of three. (iv) Section - D Answer any two questions out of three.
1.
SECTION - A (Attempt all the questions) Write True or False. 1x5=5 (a) Firewalls can greatly decrease the security of a host or a network. (b) Full form of PGP is Pretty Good Privacy. (c) Time stamp represents the time at which an event is recorded by a computer, not the time of the event itself. (d) Finger prints can be used for identification. (e) The main objectives of SSL is authenticating the client and server to each other.
MSEI-022
1
P.T.O.
2.
3.
4.
1x5=5 Fill in the blanks : can be stated as "a set of (a) An rules that precisely defines a sequence of operations". is the inventor of information (b) theory and the fundamentals of theoretical cryptography. is still required to (c) In China, a use cryptography. is the process that embeds data (d) called a watermark or digital signature or tag or label into a multimedia object. can be defined as the practice (e) and study of hiding information. SECTION - B (Attempt all the questions) Write short notes on the following : (a) Types of digital watermarking (b) Undeniable signatures (c) Transport Layer Security (TLS) (d) Computer related forgery (e) Symmetric Cryptography
5x2=10
SECTION - C (Attempt 2 out of 3 short type questions) Write in detail about "Keys" Establishment and its types.
5
5.
What are the three elements required to succeed 5 in a UDRP proceeding by the complainant.
6.
Explain the main properties of Digital Signatures.
MSEI-022
2
5
SECTION - D (Attempt 2 out of 3 long type questions) 7.
"The best policy strikes a balance between current practice and preferred future". Do you agree with the statement ? If yes, explain in detail.
10
8.
Explain the basic scanning techniques in detail.
10
9.
What are the most challenging aspects of ISO/IEC 27002 implementation and ISO/IEC 27001 compliance ?
(c) Time stamp represents the time at which an event is recorded by a computer, not the ... tag or label into a multimedia object. (e) can be defined as the practice.
OR. 1.2 What is Domain Name System (DNS) ? How is it related to IP address ? Explain the different components of the following URL â http://www.ignou.ac.in.
NETWORKING (PGDLAN). Term-End Examination. June, 2015. MLI-004 : NETWORKING AND INTERNET. TECHNOLOGY. Time : 2 hours. Maximum Marks : 50. (Weightage : 40%). Note : Answer all questions. All questions carry equal marks. Illustrate your answers with su
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
Answer any two of the following in about. 600 words each : (a) Describe the pedagogical design in e-learning. (b) Explain different types of teleconferencing and discuss their advantages and limitations. (c) What is concept mapping ? Discuss the tool
Time : 3 hours. Maximum Marks : 100. Note : (i) Answer all questions from Part A. Each questions carries 2 marks. (ii) Answer any five questions from Part B.
DISASTER MANAGEMENT (PGDDM). Ted Examination. Ui../ thane, 2015. MPA-003 : RISK ASSESSMENT AND. VULNERABILITY ANALYSIS. Time : 2 hours. Maximum Marks : 50. Note : Attempt any five questions in about 400 words each, from the following questions given
June, 2015. ELECTIVE COURSE : POLITICAL SCIENCE. EPS-08 : GOVERNMENT AND POLITICS IN. AUSTRALIA. Time : 3 hours. Maximum Marks : 100. Note. (i) Section I â Answer any ... aboriginals in Australia ? Elaborate. EPS-08. 1. P.T.O. ... Australian politi
BNS-111. No. of Printed Pages : 2. POST BASIC BACHELOR OF SCIENCE. (NURSING) ... (c) Steps of evaluation process of students. (d) Types of data analysis.
Give reasons for your answer. (b) Describe the important features of Microsoft. Excel. Why is it called the most versatile and popular spreadsheet programs ?
components with suitable illustrations, wherever required. 10. 4. (a) What do you understand by data quality in the context of GIS ? Explain the components of ...
(ii) Data structure is the format of the data as stored and manipulated on computer. ... (a) What do you understand by data quality in the context of GIS ? Explain ...
BNS-111. No. of Printed Pages : 2. POST BASIC BACHELOR OF SCIENCE. (NURSING) ... (c) Steps of evaluation process of students. (d) Types of data analysis.
This programme gives participants a comprehensive understanding of planning and conducting scientific experiments for collecting data and analysing the data ...
approved by All India Council for Technical Education (AICTE) and Mechanical department is permanently affiliated to. Savitribai Phule Pune University, Pune.
June, 2015. ELECTIVE COURSE : POLITICAL SCIENCE. EPS-08 : GOVERNMENT AND POLITICS IN. AUSTRALIA. Time : 3 hours. Maximum Marks : 100. Note. (i) Section I â Answer any ... (iii) Section III â Answer any two parts of Question. No. 13. SECTION I ...
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION