Exam Details
Subject | Network security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
1. Write true or false:
Digital signature require the sender to use the private key.
Symmetric encryption is best used for small blocks of data, digital signatures, digital envelopes, and digital certificates.
A cipher is a cryptographic system of symbols that represent words or phrases that may be secret but not always confidential.
Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher -text messages using different keys and the same algorithm.
Hypertext Transfer Protocol (http) is a means for transmitting and receiving information across the internet.
2. Fill in the blanks
Full form of CHAP is
Full form of LDAP is
The signal where the watermark is to be embedded is called the
A is a trapset to detect, deflect or in some manner counteract attempts at unauthorized use of information systems.
A is a s/w or h/w based network security system that controls the incoming and outgoing network traffic based on applied rule-set.
3. Write short note on following:
Public Key Infrastructure
Steganography
Distinguish between vulnerabilities, threat and control
Risk Analysis
Session Hijacking
4. Explain, how key distribution is achieved in symmetric key encryption.
5. What is digital signature? Describe a public key method to create and check digital signatures.
6. What is cryptography? Define various encryption terms used.
7. With the help of neat diagram, briefly explain the types of fire walls.
8. Explain Network Layer Attack. Discuss packnet sniffing in detail.
9. Describe different types of Intrusion Detection Systems (IDS).
Digital signature require the sender to use the private key.
Symmetric encryption is best used for small blocks of data, digital signatures, digital envelopes, and digital certificates.
A cipher is a cryptographic system of symbols that represent words or phrases that may be secret but not always confidential.
Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher -text messages using different keys and the same algorithm.
Hypertext Transfer Protocol (http) is a means for transmitting and receiving information across the internet.
2. Fill in the blanks
Full form of CHAP is
Full form of LDAP is
The signal where the watermark is to be embedded is called the
A is a trapset to detect, deflect or in some manner counteract attempts at unauthorized use of information systems.
A is a s/w or h/w based network security system that controls the incoming and outgoing network traffic based on applied rule-set.
3. Write short note on following:
Public Key Infrastructure
Steganography
Distinguish between vulnerabilities, threat and control
Risk Analysis
Session Hijacking
4. Explain, how key distribution is achieved in symmetric key encryption.
5. What is digital signature? Describe a public key method to create and check digital signatures.
6. What is cryptography? Define various encryption terms used.
7. With the help of neat diagram, briefly explain the types of fire walls.
8. Explain Network Layer Attack. Discuss packnet sniffing in detail.
9. Describe different types of Intrusion Detection Systems (IDS).
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws