Exam Details
Subject | Securing Internet Access | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | June, 2016 | |
City, State | new delhi, |
Question Paper
No. of Printed Pages: 4 IOSEI-042 I
.,..... ADVANCED CERTIFICATE IN INFORMATION
o SECURITY (ACISE)
o Term-End Examination
June, 2016
OSEI-04.2 SECURING INTERNET ACCESS
Time: 2 OOurs Maximum Marks 50 Note: Section Answer all the objective type questions. Section Answer all the very sOOrt answer type questions. Section Answer two out of three short answer type questions. Section Answer two out of three long answer type questions.
SECTION
(Attempt all the questions.)
1. Message means that the sender and the receiver expect privacy.
confidentiality
integrity
authentication
none of the above
2. Digital signature cannot provide for the message.
integrity
confidentiality
non repudiation
authentication
3. Password based authentication can be divided into two broad categories: and .
fixed; variable time
stamped; fixed
fixed; one-time
none of the above
4. The secret key between members needs to be created as a key when two members contact KDC.
public
session
complimentary
none of the above
5. Risk assessment is the various techniques which minimise the risk to other people.
True
False
6. is the network of networks spread across the globe.
7. is the main concern for any organization.
8. Data security threats include
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of the above
9. A protocol used to control the secure sending of data on the internet is
SMTP
HTTPS
TCP/IP
HTTP
10. The bluetooth supports
point-to-point connections
point-to-multipoint connection
both and
none of the above
SECTION
(Attempt all the very short answer type questions.)
11. Do cyber crimes occur on social networking sites like facebook? How?
12. Write a note on recommendations for secure wireless networks.
13. How do I get infected with spyware
14. Discuss e-cards.
15. Write a short note on DFS.
SECTION
(Attempt two out of three short answer type questions.)
16. How is a web service activated?
17. What is a counterfeit credit card?
18. Write the different methods used to detect and prevent the cyber-attack.
SECTION -D.
(Attempt two out of three long answer type questions.)
19. How to prevent and report credit card fraud or identify theft?
20. What is Phishing? How it works? How a user can prevent him from being a victim of phishing attack?
21. Write a descriptive note on web services security standards. Also, discuss the threats and attacks with respect to session management.
.,..... ADVANCED CERTIFICATE IN INFORMATION
o SECURITY (ACISE)
o Term-End Examination
June, 2016
OSEI-04.2 SECURING INTERNET ACCESS
Time: 2 OOurs Maximum Marks 50 Note: Section Answer all the objective type questions. Section Answer all the very sOOrt answer type questions. Section Answer two out of three short answer type questions. Section Answer two out of three long answer type questions.
SECTION
(Attempt all the questions.)
1. Message means that the sender and the receiver expect privacy.
confidentiality
integrity
authentication
none of the above
2. Digital signature cannot provide for the message.
integrity
confidentiality
non repudiation
authentication
3. Password based authentication can be divided into two broad categories: and .
fixed; variable time
stamped; fixed
fixed; one-time
none of the above
4. The secret key between members needs to be created as a key when two members contact KDC.
public
session
complimentary
none of the above
5. Risk assessment is the various techniques which minimise the risk to other people.
True
False
6. is the network of networks spread across the globe.
7. is the main concern for any organization.
8. Data security threats include
Hardware failure
Privacy invasion
Fraudulent manipulation of data
All of the above
9. A protocol used to control the secure sending of data on the internet is
SMTP
HTTPS
TCP/IP
HTTP
10. The bluetooth supports
point-to-point connections
point-to-multipoint connection
both and
none of the above
SECTION
(Attempt all the very short answer type questions.)
11. Do cyber crimes occur on social networking sites like facebook? How?
12. Write a note on recommendations for secure wireless networks.
13. How do I get infected with spyware
14. Discuss e-cards.
15. Write a short note on DFS.
SECTION
(Attempt two out of three short answer type questions.)
16. How is a web service activated?
17. What is a counterfeit credit card?
18. Write the different methods used to detect and prevent the cyber-attack.
SECTION -D.
(Attempt two out of three long answer type questions.)
19. How to prevent and report credit card fraud or identify theft?
20. What is Phishing? How it works? How a user can prevent him from being a victim of phishing attack?
21. Write a descriptive note on web services security standards. Also, discuss the threats and attacks with respect to session management.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security