Exam Details
Subject | Network security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. Write True or False:
A list of protocols used by a system, one protocol per layer is caIled protocol stack.
IPSec is designed to provide the security at the transport layer.
In tunnel mode IPSec protects the entire IP Packet.
Network layer firewall works as a packet filter.
Network layer firewall is only stateful never stateless firewall.
2. Fill in the blanks:
A network of compromised devices owned by attackers is known as
Firewalls are often configured to block traffic.
Algorithm for performing encryption and decryption is known as
An attempt to make a computer resource unavailable to users is called attack.
A is a device that forwards packet between networks by processing the routing information in the packet.
3. Write short notes on the following:
Honey pots
Steganography
Pretty Good Privacy
Asymmetric Cryptography
Port scanning tools
4. How would you quickly test a piece of Cipher text to suggest whether it was likely a result of simple substitution or a transposition?
5. Define Vulnerabilities, Threats, Attacks and Controls with suitable example of each.
6. Explain the main properties of a Hash function.
7. Explain Identity management.' What does Single Sign On mean and how is it typically implemented
8. Explain digital signature concept in detail. Which key(s) is/are used for signing the document and verifying the signature and why?
9. Explain IDS and IPS. Is Honey Pot an IDS or IPS? Justify your answer.
A list of protocols used by a system, one protocol per layer is caIled protocol stack.
IPSec is designed to provide the security at the transport layer.
In tunnel mode IPSec protects the entire IP Packet.
Network layer firewall works as a packet filter.
Network layer firewall is only stateful never stateless firewall.
2. Fill in the blanks:
A network of compromised devices owned by attackers is known as
Firewalls are often configured to block traffic.
Algorithm for performing encryption and decryption is known as
An attempt to make a computer resource unavailable to users is called attack.
A is a device that forwards packet between networks by processing the routing information in the packet.
3. Write short notes on the following:
Honey pots
Steganography
Pretty Good Privacy
Asymmetric Cryptography
Port scanning tools
4. How would you quickly test a piece of Cipher text to suggest whether it was likely a result of simple substitution or a transposition?
5. Define Vulnerabilities, Threats, Attacks and Controls with suitable example of each.
6. Explain the main properties of a Hash function.
7. Explain Identity management.' What does Single Sign On mean and how is it typically implemented
8. Explain digital signature concept in detail. Which key(s) is/are used for signing the document and verifying the signature and why?
9. Explain IDS and IPS. Is Honey Pot an IDS or IPS? Justify your answer.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws