Exam Details
Subject | Server Security | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. Which of the following pieces of information can be found in the IP header
Source address of the IP Pocket
Destination address for the IP Pocket
Sequence number of the IP Pocket
Both and
2. Which of the following are application level encryption protocols that I would most likely use in secured online banking
SSL and SET
Verisign and SHI
READY, SET and GO
PGP, PEM and SSL
3. What is the standard IANA port number used for requesting Web Pages?
80
53
21
25
4. Which of the following is/are Protocols of Application?
FTP
DNS
TELNET
All of the above
5. What is the maximum header size of an IP Pocket?
32 bytes
64 bytes
30 bytes
60 bytes
6. Which of the following is not the External Security threats?
Front -door Threats
Back -door Threats
Underground Threats
Denial of service
7. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called:
Dos attack
Slow read attack
Spoofed attack
Starvation attack
8. File virus attaches itself to the
Source file
Object file
Executable file
All of the above
9. Wi-Fi means:
Wireless Firewall
Wireless Fidelity
Wired Firewall
Wired Fidelity
10. Wireless networking is secured enough.
False
True
11. What are the five principal services provided by PGP?
12. How to prevent E-mail Spamming
13. Explain the SSL handshake Protocol.
14. What is the Security concern in WAP?
15. What do you understand by cookies?
16. Explain web application attacks.
17. What is Vulnerability? Describe XSS attack.
18. Explain URL manipulation.
19. Explain SSH and Kerberos.
20. Despite the risks of viruses and malicious attacks, most Linux web servers are inadequately protected against intrusion. How would a company go about protecting their Linux web servers against intrusion
21. Write short notes on the following:
Wi-Fi
Firewall
SQL Injection Attack
POSIX
User space Vs Kernal space
Source address of the IP Pocket
Destination address for the IP Pocket
Sequence number of the IP Pocket
Both and
2. Which of the following are application level encryption protocols that I would most likely use in secured online banking
SSL and SET
Verisign and SHI
READY, SET and GO
PGP, PEM and SSL
3. What is the standard IANA port number used for requesting Web Pages?
80
53
21
25
4. Which of the following is/are Protocols of Application?
FTP
DNS
TELNET
All of the above
5. What is the maximum header size of an IP Pocket?
32 bytes
64 bytes
30 bytes
60 bytes
6. Which of the following is not the External Security threats?
Front -door Threats
Back -door Threats
Underground Threats
Denial of service
7. When an attempt is to make a machine or network resource unavailable to its intended users, the attack is called:
Dos attack
Slow read attack
Spoofed attack
Starvation attack
8. File virus attaches itself to the
Source file
Object file
Executable file
All of the above
9. Wi-Fi means:
Wireless Firewall
Wireless Fidelity
Wired Firewall
Wired Fidelity
10. Wireless networking is secured enough.
False
True
11. What are the five principal services provided by PGP?
12. How to prevent E-mail Spamming
13. Explain the SSL handshake Protocol.
14. What is the Security concern in WAP?
15. What do you understand by cookies?
16. Explain web application attacks.
17. What is Vulnerability? Describe XSS attack.
18. Explain URL manipulation.
19. Explain SSH and Kerberos.
20. Despite the risks of viruses and malicious attacks, most Linux web servers are inadequately protected against intrusion. How would a company go about protecting their Linux web servers against intrusion
21. Write short notes on the following:
Wi-Fi
Firewall
SQL Injection Attack
POSIX
User space Vs Kernal space
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security