Exam Details

Subject Application and business Security developments
Paper
Exam / Course PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date December, 2016
City, State new delhi,


Question Paper

1. A webpage displays a picture. What tag was used to display that picture

Picture

Image

img

Src

Choose the correct answer

2. tag makes the enclosed text bold. What is other tag to make text bold

<strong>



black



Choose the correct answer

3. a person who performs most of the same activities a hacker does, but with the owner or company's permission.

Tester

Ethical Hacker

Script kiddies

CBI

Choose the correct answer

4. is the other name for Script Kiddies.

Pocket Monkeys

Penetration Testers

Security Testers

Good Hackers

Choose the correct answer

5. Which of the following is not a model in penetration testing?

white box model

black box model

red box model

gray box model

Choose the correct answer

6. TCP stands for

Transmission Control Protocol

Transport Control Based

Transmission Congestion Protocol

Transit Control Protocol

Choose the correct answer

7. UDP is a Protocol.

Connectionless

Connection Oriented

Synchronous

Asynchronous

Choose the correct answer

8. a computer virus encoded as a macro in programs that supports a macro language.

Virus

Macro Virus

Worm

Trojans

Choose the correct answer

9. What is the main purpose of access control

To authorise full access to authorised users.

To limit the actions or operations that a legitimate user can perform.

To stop unauthorised users accessing resources

To protect computers from viral infections

Choose the correct answer

10. The software or hardware components that records each keystroke a user enters into a word processing document is called a

Sniffer

Keylogger

Trojan program

Buffer overflow

Choose the correct answer

11. Explain Malicious Programs.

12. Describe asymmetric cryptography.

13. How do users prevent and protect themselves against viruses

14. What is XSS?

15. What are the three ways to authenticate a person?

16. Explain SSL, SMTP and HTTPS.

17. What are Information System threats and attacks?

18. What are the basic principles of information security? Also explain other terms in information security.

19. Define Active and Passive attacks. Explain the types of Active and Passive attacks with example.

20. Explain the concept of building security into software/system development life cycle.

21.(a) Write short notes on SQL Infection Attack

21.(b) Write short notes on Buffer overflow attack

21.(c) Write short notes on Digital signature

21.(d) Write short notes on Ethical Hacking

21.(e) PKI


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Application and business Security developments
  • Bcp, dr planning and audit
  • Cyber security
  • Digital forensics
  • Introduction to Information Security
  • Network security
  • Policy, Standards And Laws