Exam Details

Subject Application and business Security developments
Paper
Exam / Course PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date June, 2016
City, State new delhi,


Question Paper

1. Which statement is true

An XML document can have one root element.

An XML document can have one child element.

XML elements have to be in lower case.

All of the above

2. Choose the correct HTML tag for the largest heading?







<HEAD>

3. In computer security means that computer system assets can be modified only by authorized parties.

Confidentiality

Integrity

Availability

Authenticity


4. Which of the following malicious program do not replicate automatically?

Trojan Horse

Virus

Worm

Zombie

5. The types of threats on the security of a computer system or network are

Interruption

Interception

Modification

Creation

Fabrication

and only

and only

and only

All

6. IP Sec is designed to provide the security at the

Transport layer

Application layer

Network layer

Session layer

7. Which of the following is/are protocol/s of Application

FTP

DNS

Telnet

All of the above

8. Which of the following does not use a cryptographical technique to protect data

The use of digital signatures

Data Encryption

The use of stored encrypted password files

Using asymmetric keys at sender and receiver nodes

9. PGP encrypts data by using a block cipher called:

IDEA

Private data encryption algorithm

Internet data encryption algorithm

None

10. Gathering information by what users enter on their keyboards, especially login names and passwords is known as

Dumpster Diving

Shoulder Surfing

Piggy Backing

Password Hashing

11. Write the difference between White Hacker, Black Hacker and Grey Hacker.

12. What is CIA (Confidentiality, Integrity and Availability)

13. Explain symmetric cryptography algorithm.

14. Write the difference between XML and HTML.

15. What is XSS

16. Explain HTTP, HTTPS and TCP.

17. Define Buffer overflow attack and how to prevent from it?

18. Explain Black Box Testing and White Box Testing.

19. Explain the flow of transaction in SCT with diagram.

20. What is malicious program? Write the types of malicious programs and explain them..

21. Write short notes on the following:

IP spoofing

PKI

Phishing

Dumpester Diving

Keyloggers


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Application and business Security developments
  • Bcp, dr planning and audit
  • Cyber security
  • Digital forensics
  • Introduction to Information Security
  • Network security
  • Policy, Standards And Laws