Exam Details
Subject | Application and business Security developments | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
1. Which statement is true
An XML document can have one root element.
An XML document can have one child element.
XML elements have to be in lower case.
All of the above
2. Choose the correct HTML tag for the largest heading?
<HEAD>
3. In computer security means that computer system assets can be modified only by authorized parties.
Confidentiality
Integrity
Availability
Authenticity
4. Which of the following malicious program do not replicate automatically?
Trojan Horse
Virus
Worm
Zombie
5. The types of threats on the security of a computer system or network are
Interruption
Interception
Modification
Creation
Fabrication
and only
and only
and only
All
6. IP Sec is designed to provide the security at the
Transport layer
Application layer
Network layer
Session layer
7. Which of the following is/are protocol/s of Application
FTP
DNS
Telnet
All of the above
8. Which of the following does not use a cryptographical technique to protect data
The use of digital signatures
Data Encryption
The use of stored encrypted password files
Using asymmetric keys at sender and receiver nodes
9. PGP encrypts data by using a block cipher called:
IDEA
Private data encryption algorithm
Internet data encryption algorithm
None
10. Gathering information by what users enter on their keyboards, especially login names and passwords is known as
Dumpster Diving
Shoulder Surfing
Piggy Backing
Password Hashing
11. Write the difference between White Hacker, Black Hacker and Grey Hacker.
12. What is CIA (Confidentiality, Integrity and Availability)
13. Explain symmetric cryptography algorithm.
14. Write the difference between XML and HTML.
15. What is XSS
16. Explain HTTP, HTTPS and TCP.
17. Define Buffer overflow attack and how to prevent from it?
18. Explain Black Box Testing and White Box Testing.
19. Explain the flow of transaction in SCT with diagram.
20. What is malicious program? Write the types of malicious programs and explain them..
21. Write short notes on the following:
IP spoofing
PKI
Phishing
Dumpester Diving
Keyloggers
An XML document can have one root element.
An XML document can have one child element.
XML elements have to be in lower case.
All of the above
2. Choose the correct HTML tag for the largest heading?
<HEAD>
3. In computer security means that computer system assets can be modified only by authorized parties.
Confidentiality
Integrity
Availability
Authenticity
4. Which of the following malicious program do not replicate automatically?
Trojan Horse
Virus
Worm
Zombie
5. The types of threats on the security of a computer system or network are
Interruption
Interception
Modification
Creation
Fabrication
and only
and only
and only
All
6. IP Sec is designed to provide the security at the
Transport layer
Application layer
Network layer
Session layer
7. Which of the following is/are protocol/s of Application
FTP
DNS
Telnet
All of the above
8. Which of the following does not use a cryptographical technique to protect data
The use of digital signatures
Data Encryption
The use of stored encrypted password files
Using asymmetric keys at sender and receiver nodes
9. PGP encrypts data by using a block cipher called:
IDEA
Private data encryption algorithm
Internet data encryption algorithm
None
10. Gathering information by what users enter on their keyboards, especially login names and passwords is known as
Dumpster Diving
Shoulder Surfing
Piggy Backing
Password Hashing
11. Write the difference between White Hacker, Black Hacker and Grey Hacker.
12. What is CIA (Confidentiality, Integrity and Availability)
13. Explain symmetric cryptography algorithm.
14. Write the difference between XML and HTML.
15. What is XSS
16. Explain HTTP, HTTPS and TCP.
17. Define Buffer overflow attack and how to prevent from it?
18. Explain Black Box Testing and White Box Testing.
19. Explain the flow of transaction in SCT with diagram.
20. What is malicious program? Write the types of malicious programs and explain them..
21. Write short notes on the following:
IP spoofing
PKI
Phishing
Dumpester Diving
Keyloggers
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws