Exam Details
Subject | Information Security | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
No. of Printed Pages: 4 IOSEI-0411
C1'oI t'-ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
o
Term-End Examination
June, 2016
OSEI-041 INFORMATION SECURITY
Time: 2 Iwurs Maximum Marks 50
Note: Section A -Answer all tire objecti11e questions.
Section B -Answer all tire l1Cnj slwrt answer
questions.
Section C -Allsll1Cr any two questions out of
three.
Section D -Allswer any two questiolls out of
three.
SECTION
Objective questions (Attempt all the questions)
1. A stateful firewall maintains a which is a list of active connections.
routing table
bridging table
state table
connection table
2. NTFS stands for .
3. VOIP stands for .
4. A firewall needs to be so that it can grow with the network it protects.
robust
expensive
fast
scalable
5. Accurate and complete data enters the system for processing and remains accurate thereafter, is said to have:
Integrity
Security
Viruses
Accidental deletion
6. Worms and viruses are programs that can cause destruction of data and software, but they differ on how they spread and function.
True
False
7. Inaccurate data entry, worms and viruses, fraud and hardware malfunction are ways which affects
Data Security
Users
Software
Database
8. How are viruses spread
Through firewalls
downloading infected programs and files from internet
Garbled information
install anti-virus
9. provides a connection-oriented reliable service for sending messages.
TCP
IP
UDP
All of the above
10. A firewall is a secure and trusted machine that sits between a private and public network.
True
False
SECTION
Very short questions
(Attempt all the questions)
11. Define physical security.
12. What are the critical characteristics of information?
13. What are the components of an information system?
14. What is the difference between a threat agent and a threat?
15. What is hacking?
SECTION
Short answer questions
(Attempt 2 out of 3 questions)
16. What are "computer worms" How they are different from "Computer Viruses"
17. What do you understand by cryptographic protocol? Explain with the help of suitable examples.
18. Explain the role of security protocols.
SECTION
Long answer questions
(Attempt 2 out of 3 questions)
19. Discuss in detail, how a computer system can be attacked? Also discuss the protection measures.
20. What is authentication mechanism? Explain in detail.
21. What is an information security blueprint? Indentify its major components and explain how it supports the information security program
C1'oI t'-ADVANCED CERTIFICATE IN INFORMATION SECURITY (ACISE)
o
Term-End Examination
June, 2016
OSEI-041 INFORMATION SECURITY
Time: 2 Iwurs Maximum Marks 50
Note: Section A -Answer all tire objecti11e questions.
Section B -Answer all tire l1Cnj slwrt answer
questions.
Section C -Allsll1Cr any two questions out of
three.
Section D -Allswer any two questiolls out of
three.
SECTION
Objective questions (Attempt all the questions)
1. A stateful firewall maintains a which is a list of active connections.
routing table
bridging table
state table
connection table
2. NTFS stands for .
3. VOIP stands for .
4. A firewall needs to be so that it can grow with the network it protects.
robust
expensive
fast
scalable
5. Accurate and complete data enters the system for processing and remains accurate thereafter, is said to have:
Integrity
Security
Viruses
Accidental deletion
6. Worms and viruses are programs that can cause destruction of data and software, but they differ on how they spread and function.
True
False
7. Inaccurate data entry, worms and viruses, fraud and hardware malfunction are ways which affects
Data Security
Users
Software
Database
8. How are viruses spread
Through firewalls
downloading infected programs and files from internet
Garbled information
install anti-virus
9. provides a connection-oriented reliable service for sending messages.
TCP
IP
UDP
All of the above
10. A firewall is a secure and trusted machine that sits between a private and public network.
True
False
SECTION
Very short questions
(Attempt all the questions)
11. Define physical security.
12. What are the critical characteristics of information?
13. What are the components of an information system?
14. What is the difference between a threat agent and a threat?
15. What is hacking?
SECTION
Short answer questions
(Attempt 2 out of 3 questions)
16. What are "computer worms" How they are different from "Computer Viruses"
17. What do you understand by cryptographic protocol? Explain with the help of suitable examples.
18. Explain the role of security protocols.
SECTION
Long answer questions
(Attempt 2 out of 3 questions)
19. Discuss in detail, how a computer system can be attacked? Also discuss the protection measures.
20. What is authentication mechanism? Explain in detail.
21. What is an information security blueprint? Indentify its major components and explain how it supports the information security program
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security