Exam Details
Subject | Information Security | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. An intentionally disruptive program that spreads from program to program or from disk to disk is known as:
Trojan horse
Virus
Time bomb
Time-related bomb sequence
2. What type of virus uses computer hosts to reproduce itself
Time bomb
Worm
Melissa virus
Macro virus
3. Software programs that close potential security breaches in an operating system are known as
Security breach fixes
Refresh patches
Security repairs
Security patches
4. What is the name of an application program that gathers user information and sends it to someone through the Internet
A virus
Spybot
Logic bomb
Firewall, security patch
5. Hardware or Software designed to guard against unauthorised access to a computer network is known as:
Hacker -proof program
Hacker -resistant server
Encryption safe wall
Firewall
6. Creating strong computer security to prevent computer crime usually simultaneously helps protect:
Privacy rights
Personal ethics
The number of cookies downloaded to your personal computer
Personal space
7. Security procedures:
will eliminate all computer security risk
can reduce but not all eliminate risk
are prohibitively expensive
are inaccessible for the average home user
8. What is a firewall in computer network
The physical boundary of network.
An operating system of computer network.
A system designed to prevent unauthorized access.
A web browsing software.
9. Which protocol is used in ping command
TCP
ICMP
UDP
None of the above
10. What does SSL stand for?
Secure Socket Layer
Secured Section Layer
Secure Secret Layer
None of the above
11. Write some useful tricks to make a strong password.
12. Explain the process of data Recovery.
13. What is cipher text?
14. What is difference between encryption and decryption
15. What is the difference between vulnerability and exposure?
16. What are the measures that may be taken for intrusion detection
17. Write a note on Social Engineering.
18. What are the differences between physical data security and software based data security
19. Explain the difference between System Development Life Cycle (SDLC) and Security System Development Life Cycle (Sec SDLC).
20. Explain the application of Biometrics technology in detail.
21. What is protocol? What is the need of protocol? Differentiate between the hardware and software protocol?
Trojan horse
Virus
Time bomb
Time-related bomb sequence
2. What type of virus uses computer hosts to reproduce itself
Time bomb
Worm
Melissa virus
Macro virus
3. Software programs that close potential security breaches in an operating system are known as
Security breach fixes
Refresh patches
Security repairs
Security patches
4. What is the name of an application program that gathers user information and sends it to someone through the Internet
A virus
Spybot
Logic bomb
Firewall, security patch
5. Hardware or Software designed to guard against unauthorised access to a computer network is known as:
Hacker -proof program
Hacker -resistant server
Encryption safe wall
Firewall
6. Creating strong computer security to prevent computer crime usually simultaneously helps protect:
Privacy rights
Personal ethics
The number of cookies downloaded to your personal computer
Personal space
7. Security procedures:
will eliminate all computer security risk
can reduce but not all eliminate risk
are prohibitively expensive
are inaccessible for the average home user
8. What is a firewall in computer network
The physical boundary of network.
An operating system of computer network.
A system designed to prevent unauthorized access.
A web browsing software.
9. Which protocol is used in ping command
TCP
ICMP
UDP
None of the above
10. What does SSL stand for?
Secure Socket Layer
Secured Section Layer
Secure Secret Layer
None of the above
11. Write some useful tricks to make a strong password.
12. Explain the process of data Recovery.
13. What is cipher text?
14. What is difference between encryption and decryption
15. What is the difference between vulnerability and exposure?
16. What are the measures that may be taken for intrusion detection
17. Write a note on Social Engineering.
18. What are the differences between physical data security and software based data security
19. Explain the difference between System Development Life Cycle (SDLC) and Security System Development Life Cycle (Sec SDLC).
20. Explain the application of Biometrics technology in detail.
21. What is protocol? What is the need of protocol? Differentiate between the hardware and software protocol?
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security