Exam Details
Subject | Introduction to Information Security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. Data Encryption are done on of OSI model.
2. NIC stands for
3. An assembler is dependent.
4. IDPS stands for
5. The 4 byte IP address consists of
network address
host address
both and
none of the mentioned
6. The network layer protocol of internet is
ethernet
internet protocol
hypertext transfer protocol
none of the above
7. Multidestination routing
is same as broadcast routing
contains the list of all destinations
data is not sent by packets
none of the above
8. Security weaknesses can always be entirely eliminated
True
False
9. Account expiration is the same as password expiration
True
False
10. By default, a digital signature provides encryption for a message:
True
False
11. What is Virus and what are its symptoms
12. Explain the concept of Encryption.
13. Explain Operation System.
14. Explain Brute-force computation.
15. What do you mean by cryptography?
16. What is Network Security and why is it important?
17. Explain cryptography and overview of 55L Handshake.
18. What are the two methods for computing passwords?
19. What is Malware? What kind of precautions can we use to overcome the virus problem?
20. What is cryptanalysis? Explain in brief differential and linear cryptanalysis.
21. Write short notes on the following:
Hacktivism
Cyber crime investigation
File Servers
SMI and MBI
Logic Bomb
2. NIC stands for
3. An assembler is dependent.
4. IDPS stands for
5. The 4 byte IP address consists of
network address
host address
both and
none of the mentioned
6. The network layer protocol of internet is
ethernet
internet protocol
hypertext transfer protocol
none of the above
7. Multidestination routing
is same as broadcast routing
contains the list of all destinations
data is not sent by packets
none of the above
8. Security weaknesses can always be entirely eliminated
True
False
9. Account expiration is the same as password expiration
True
False
10. By default, a digital signature provides encryption for a message:
True
False
11. What is Virus and what are its symptoms
12. Explain the concept of Encryption.
13. Explain Operation System.
14. Explain Brute-force computation.
15. What do you mean by cryptography?
16. What is Network Security and why is it important?
17. Explain cryptography and overview of 55L Handshake.
18. What are the two methods for computing passwords?
19. What is Malware? What kind of precautions can we use to overcome the virus problem?
20. What is cryptanalysis? Explain in brief differential and linear cryptanalysis.
21. Write short notes on the following:
Hacktivism
Cyber crime investigation
File Servers
SMI and MBI
Logic Bomb
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws