Exam Details

Subject Information Security
Paper
Exam / Course Advanced Certificate in Information Security (ACISE)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date December, 2015
City, State new delhi,


Question Paper

1. An intentionally disruptive program that spreads from program to program or from disk to disk is known as:

Trojan horse

Virus

Time bomb

Time-related bomb sequence

2. What type of virus uses computer hosts to reproduce itself

Time bomb

Worm

Melissa virus

Macro virus

3. Software programs that close potential security breaches in an operating system are known as

Security breach fixes

Refresh patches

Security repairs

Security patches

4. What is the name of an application program that gathers user information and sends it to someone through the Internet

A virus

Spybot

Logic bomb

Firewall, security patch

5. Hardware or Software designed to guard against unauthorised access to a computer network is known as:

Hacker -proof program

Hacker -resistant server

Encryption safe wall

Firewall

6. Creating strong computer security to prevent computer crime usually simultaneously helps protect:

Privacy rights

Personal ethics

The number of cookies downloaded to your personal computer

Personal space

7. Security procedures:

will eliminate all computer security risk

can reduce but not all eliminate risk

are prohibitively expensive

are inaccessible for the average home user

8. What is a firewall in computer network

The physical boundary of network.

An operating system of computer network.

A system designed to prevent unauthorized access.

A web browsing software.

9. Which protocol is used in ping command

TCP

ICMP

UDP

None of the above

10. What does SSL stand for?

Secure Socket Layer

Secured Section Layer

Secure Secret Layer

None of the above

11. Write some useful tricks to make a strong password.

12. Explain the process of data Recovery.

13. What is cipher text?

14. What is difference between encryption and decryption

15. What is the difference between vulnerability and exposure?

16. What are the measures that may be taken for intrusion detection

17. Write a note on Social Engineering.

18. What are the differences between physical data security and software based data security

19. Explain the difference between System Development Life Cycle (SDLC) and Security System Development Life Cycle (Sec SDLC).

20. Explain the application of Biometrics technology in detail.

21. What is protocol? What is the need of protocol? Differentiate between the hardware and software protocol?


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Information Security
  • Information Technology Securtiy
  • Securing Internet Access
  • Server Security