Exam Details

Subject Introduction to Information Security
Paper
Exam / Course PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date June, 2016
City, State new delhi,


Question Paper

1. Which of the following computer security threats can be updated automatically and remotely? (Select best answer)
Virus Worm Zombie Malware

2. Which of the following is not an example of malicious software Root kits Spyware

(c) Viruses

(d) Browser

3. Which type of attack uses more than one computer?

(a) Virus DOS Worm DDOS

4. Which of the following does not need updating? HIDS Antivirus Software Pop-up blockers Antispyware

5. What is a malicious attack that executes at the same time every week? Virus Worm Bluejacking Logic bomb

6. DDOS stands for Which topology is referred to as hub-and-spoke topology Star Ring Bus Tree

8. The process of a computer receiving information from a server on the internet is known as downloading pulling transferring uploading

9. In order to view pages on a website, the user needs to enter the site address called Uniform Resource Locator email address postal address MAC address

10. Memory stores:

(a) the operating system application programs the data being processed by the application programs all of the above

11. Differentiate between SYN flood and ICMP flood.

12. What makes DDGS attacks possible?

13. Write short note on MIB.

14. Differentiate between Interpreter and Compiler.

15. Write a short note on Encryption and Decryption of data.

16. Explain Network Management Architecture.

17. What is Network Security and why it is important ?

18. What is cryptography? Why is it important?

Long answer type questions (Attempt 2 out of 3 questions)

19. Give the five basic steps used by computer hackers to gain unauthorized access over a computer system.

20. Consider online examination system, where students can login and answer questions online. For this system, identify vulnerability, threats and attacks.

21. Write short notes on the following: Firewall File Server


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Application and business Security developments
  • Bcp, dr planning and audit
  • Cyber security
  • Digital forensics
  • Introduction to Information Security
  • Network security
  • Policy, Standards And Laws