Exam Details
Subject | information security | |
Paper | ||
Exam / Course | symca | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | May, 2017 | |
City, State | maharashtra, solapur |
Question Paper
TYMCA (Part (Under Faculty of Engg.) Examination, 2017
INFORMATION SECURITY
Day and Date Tuesday, 9-5-2017 Total Marks 100
Time 10.30 a.m. to 1.30 p.m.
Instructions Figures to the right indicate marks.
Q.3.A. and Q.5.A. are compulsory.
Write a program if necessary.
1. Multiple Choice Questions. 20
C.I.A. triangle has been the industry standard for computer security since the
development of
Mainframe Supercomputer
Desktop pc All of the above
Once the organizational assets have been identified, a threat assessment
process the risks facing each asset.
Identifies Quantifies
Both a and b None of the above
A risk management strategy requires that information security professionals
know their organizations information asset that is
Identify Classify
Prioritize All of the above
act regulates government agencies and holds them
accountable if they release private information about individuals or businesses
without permission.
Federal Privacy Economic Espionage
Digital Millennium Copyright None of the above
Any or material the unauthorized disclosure of
which reasonably could be expected to cause serious damage to the national
security.
Secret data Confidential data
Sensitive data None of the above
comprises a wide variety of laws that govern a nation or
state and deal with the relationships and conflicts between organizational
entities and people.
Management must define type of security policy, according
to the National Institute of Standards.
EISP ISSP
SysSP All of the above
Internet protocol is vulnerable to denial for service is
Sabotage Espionage
Trespass None of the above
information of the utmost secrecy to the organization,
disclosure of which could severely impact the well-being of the organization.
Public Classified
Sensitive None of the above
10) A is a plan or course of action that conveys instructions from
an organization's senior management to those who make decisions, take
actions, and perform other duties.
Policy Standards
Practices All of the above
11) IT Act, 2000 is India's legislation regulating the use of computers, computer
systems and computer networks, data and information in the
format.
Electronic Digital
Both a and b None of the above
12) A digital signature can be used with kind of message, whether it is
Encrypted Decrypted
Both a and b None of the above
13) Cyber crimes are unlawful acts where the computer is used as a
Tool Target
Both a and b None of the above
14) Violation of cyber laws rules of conduct lead to Govt. action as
Imprisonment Fine
a or b Both a and b
15) IT Amendment Bill, 2008 which was passed in in December,
2008.
Lok Sabha Rajya Sabha
Both a and b None of the above
16) The ownership of a digital signature key is bound to a specific user and thus a
valid signature shows that the message was sent by that user is
Authentication Integrity
Non repudiation All of the above
17) A Certifying Authority is a trusted body whose central responsibility is to
and provide directories of Digital Certificates.
Issue Revoke
Renew All of the above
18) A DSC shall not be suspended for a period exceeding days
unless the subscriber has been given an opportunity of being heard in the
matter.
Ten Fifteen
Twenty Five
19) The controller shall make use of that are secure from
intrusion and misuse.
Hardware Software
Procedures All of the above
20) The issue digital signature certificates for electronic
authentication of users.
CA CCA
Both a and b None of the above
SECTION I
2. Write short note on (any 4). 20
NSTISSC Security Model.
Need of Security.
Legal and Ethical issues.
Security Policies.
IDPS.
3. Explain in detail critical characteristics of information. 10
How classification and Priority assignment to an asset is done 10
OR
What do you mean by cryptography Explain its methods and tools. 10
SECTION II
4. Write a short note on (any 4). 20
IT Act 2000 and Amendments.
Digital Signature features.
Power of Controller.
Trademark Dispute.
Staff of the Cyber Appellate Tribunal.
5. What are the importants of Information Technology Act 2000 10
Describe powers of Controller of Certifing Authority. 10
OR
Explain process for establishment of Cyber Appellate Tribunal. 10
INFORMATION SECURITY
Day and Date Tuesday, 9-5-2017 Total Marks 100
Time 10.30 a.m. to 1.30 p.m.
Instructions Figures to the right indicate marks.
Q.3.A. and Q.5.A. are compulsory.
Write a program if necessary.
1. Multiple Choice Questions. 20
C.I.A. triangle has been the industry standard for computer security since the
development of
Mainframe Supercomputer
Desktop pc All of the above
Once the organizational assets have been identified, a threat assessment
process the risks facing each asset.
Identifies Quantifies
Both a and b None of the above
A risk management strategy requires that information security professionals
know their organizations information asset that is
Identify Classify
Prioritize All of the above
act regulates government agencies and holds them
accountable if they release private information about individuals or businesses
without permission.
Federal Privacy Economic Espionage
Digital Millennium Copyright None of the above
Any or material the unauthorized disclosure of
which reasonably could be expected to cause serious damage to the national
security.
Secret data Confidential data
Sensitive data None of the above
comprises a wide variety of laws that govern a nation or
state and deal with the relationships and conflicts between organizational
entities and people.
Management must define type of security policy, according
to the National Institute of Standards.
EISP ISSP
SysSP All of the above
Internet protocol is vulnerable to denial for service is
Sabotage Espionage
Trespass None of the above
information of the utmost secrecy to the organization,
disclosure of which could severely impact the well-being of the organization.
Public Classified
Sensitive None of the above
10) A is a plan or course of action that conveys instructions from
an organization's senior management to those who make decisions, take
actions, and perform other duties.
Policy Standards
Practices All of the above
11) IT Act, 2000 is India's legislation regulating the use of computers, computer
systems and computer networks, data and information in the
format.
Electronic Digital
Both a and b None of the above
12) A digital signature can be used with kind of message, whether it is
Encrypted Decrypted
Both a and b None of the above
13) Cyber crimes are unlawful acts where the computer is used as a
Tool Target
Both a and b None of the above
14) Violation of cyber laws rules of conduct lead to Govt. action as
Imprisonment Fine
a or b Both a and b
15) IT Amendment Bill, 2008 which was passed in in December,
2008.
Lok Sabha Rajya Sabha
Both a and b None of the above
16) The ownership of a digital signature key is bound to a specific user and thus a
valid signature shows that the message was sent by that user is
Authentication Integrity
Non repudiation All of the above
17) A Certifying Authority is a trusted body whose central responsibility is to
and provide directories of Digital Certificates.
Issue Revoke
Renew All of the above
18) A DSC shall not be suspended for a period exceeding days
unless the subscriber has been given an opportunity of being heard in the
matter.
Ten Fifteen
Twenty Five
19) The controller shall make use of that are secure from
intrusion and misuse.
Hardware Software
Procedures All of the above
20) The issue digital signature certificates for electronic
authentication of users.
CA CCA
Both a and b None of the above
SECTION I
2. Write short note on (any 4). 20
NSTISSC Security Model.
Need of Security.
Legal and Ethical issues.
Security Policies.
IDPS.
3. Explain in detail critical characteristics of information. 10
How classification and Priority assignment to an asset is done 10
OR
What do you mean by cryptography Explain its methods and tools. 10
SECTION II
4. Write a short note on (any 4). 20
IT Act 2000 and Amendments.
Digital Signature features.
Power of Controller.
Trademark Dispute.
Staff of the Cyber Appellate Tribunal.
5. What are the importants of Information Technology Act 2000 10
Describe powers of Controller of Certifing Authority. 10
OR
Explain process for establishment of Cyber Appellate Tribunal. 10
Other Question Papers
Subjects
- advanced internet technology
- artificial technology
- cloud computing
- computer graphics
- computer networks
- computer organization and architecture
- data structure
- data warehousing and data mining
- fuzzy logic and artificial neural network
- information security
- mobile communication
- object oriented analysis and design
- operations research
- programming in java
- relational database management system
- system programming
- unix operating system