Exam Details
Subject | Information Security | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. The software package which automatically plays, displays, downloads advertisements is known as:
Viruses
Worms
Trojan horses
Adware
2. The translation of data into a secret code is known as:
Hacking
Data Encryption
Decryption
None of the above
3. Tampering the computer source documents is an offence as per Indian IT Act 2000 under
Section -65
Section -66
Section -67
Section -68
4. Net Scan Tool Pro is used for
5. I LOVE YOU is a virus.
True
False
6. Pear to pear and client server are two type of
7. GID stands for
Group Integrated Devices
Google ID
Group Identification
Graphico Intrusion Detection
8. EFS stands for
9. ARPANET stands for
10. UAC stands for
11. What are Antivirus and Worms?
12. How software security is threatened?
13. What are the categories of Cryptographic Protocol?
14. Discuss Software Piracy.
15. Write a short note on POP and SMTP.
16. Write a short note on window Defender, Windows Firewall, Spy Hunters.
17. Write all the commands to drop the mail by using telnet.
18. Explain how Port Scanner is different from vulnerability scanner tool.
19. What are data recovery techniques? Generate the Computer Security Audit Checklist.
20. Is Linux better than Windows? Why and explain them.
21. What do you understand by "Anti-Piracy Tools" What is the process of secure downloading from Internet?
Viruses
Worms
Trojan horses
Adware
2. The translation of data into a secret code is known as:
Hacking
Data Encryption
Decryption
None of the above
3. Tampering the computer source documents is an offence as per Indian IT Act 2000 under
Section -65
Section -66
Section -67
Section -68
4. Net Scan Tool Pro is used for
5. I LOVE YOU is a virus.
True
False
6. Pear to pear and client server are two type of
7. GID stands for
Group Integrated Devices
Google ID
Group Identification
Graphico Intrusion Detection
8. EFS stands for
9. ARPANET stands for
10. UAC stands for
11. What are Antivirus and Worms?
12. How software security is threatened?
13. What are the categories of Cryptographic Protocol?
14. Discuss Software Piracy.
15. Write a short note on POP and SMTP.
16. Write a short note on window Defender, Windows Firewall, Spy Hunters.
17. Write all the commands to drop the mail by using telnet.
18. Explain how Port Scanner is different from vulnerability scanner tool.
19. What are data recovery techniques? Generate the Computer Security Audit Checklist.
20. Is Linux better than Windows? Why and explain them.
21. What do you understand by "Anti-Piracy Tools" What is the process of secure downloading from Internet?
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security