Exam Details
Subject | Bcp, dr planning and audit | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. QRA stands for
Qualitative Risk Analysis
Quantitative Risk Analyst
Quantitative Risk Analyzing
None of these
2. When FMECA is extended by a critically analysis the technique is then called
3. CMT stands for
4. Denial of service of an attack that prevents legitimate users from making use of a service and it can be very hard to prevent.
True
False
5. the transformation of Plain text into Cipher text by Cryptographic techniques.
6. An end user may unknowingly introduce on the network when they run malicious executable code.
7. Health Disaster Management Programme evaluated by:
Evaluation of preparedness programme
Evaluation of Mitigation measures
Evaluation of the training
All of above
8. The technique was developed in early 1970 by Imperial Chemical Industries Ltd.
9. Tracking Progress of the Project has two techniques were called and
10. are used to verify that the user of an ID is the owner of the ID.
11. Differentiate Risk and Opportunity.
12. What is meant by disaster recovery?
13. Explain Resumption.
14. What is Biometric Access Control?
15. Explain the term Template.
16. Mention any five risk identification methods along with their advantage and disadvantage.
17. What is meant by Window Server backup?
18. List any five potential causes for system failure.
19. How long will it take to prepare a business continuity Management Plan
20. Name the different stages present in the five-stage Crisis Management framework.
21. Write short notes on
Boycott
Safety Management Organisation review Technique
Example of RBS
BCM Audit
Contingency Planning
Qualitative Risk Analysis
Quantitative Risk Analyst
Quantitative Risk Analyzing
None of these
2. When FMECA is extended by a critically analysis the technique is then called
3. CMT stands for
4. Denial of service of an attack that prevents legitimate users from making use of a service and it can be very hard to prevent.
True
False
5. the transformation of Plain text into Cipher text by Cryptographic techniques.
6. An end user may unknowingly introduce on the network when they run malicious executable code.
7. Health Disaster Management Programme evaluated by:
Evaluation of preparedness programme
Evaluation of Mitigation measures
Evaluation of the training
All of above
8. The technique was developed in early 1970 by Imperial Chemical Industries Ltd.
9. Tracking Progress of the Project has two techniques were called and
10. are used to verify that the user of an ID is the owner of the ID.
11. Differentiate Risk and Opportunity.
12. What is meant by disaster recovery?
13. Explain Resumption.
14. What is Biometric Access Control?
15. Explain the term Template.
16. Mention any five risk identification methods along with their advantage and disadvantage.
17. What is meant by Window Server backup?
18. List any five potential causes for system failure.
19. How long will it take to prepare a business continuity Management Plan
20. Name the different stages present in the five-stage Crisis Management framework.
21. Write short notes on
Boycott
Safety Management Organisation review Technique
Example of RBS
BCM Audit
Contingency Planning
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws