Exam Details

Subject Securing Internet Access
Paper
Exam / Course Advanced Certificate in Information Security (ACISE)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date June, 2016
City, State new delhi,


Question Paper

No. of Printed Pages: 4 IOSEI-042 I
.,..... ADVANCED CERTIFICATE IN INFORMATION
o SECURITY (ACISE)
o Term-End Examination
June, 2016
OSEI-04.2 SECURING INTERNET ACCESS

Time: 2 OOurs Maximum Marks 50 Note: Section Answer all the objective type questions. Section Answer all the very sOOrt answer type questions. Section Answer two out of three short answer type questions. Section Answer two out of three long answer type questions.
SECTION
(Attempt all the questions.)

1. Message means that the sender and the receiver expect privacy.

confidentiality

integrity

authentication

none of the above

2. Digital signature cannot provide for the message.

integrity

confidentiality

non repudiation

authentication

3. Password based authentication can be divided into two broad categories: and .

fixed; variable time

stamped; fixed

fixed; one-time

none of the above

4. The secret key between members needs to be created as a key when two members contact KDC.

public

session

complimentary

none of the above

5. Risk assessment is the various techniques which minimise the risk to other people.

True

False

6. is the network of networks spread across the globe.

7. is the main concern for any organization.

8. Data security threats include

Hardware failure

Privacy invasion

Fraudulent manipulation of data

All of the above

9. A protocol used to control the secure sending of data on the internet is

SMTP

HTTPS

TCP/IP

HTTP

10. The bluetooth supports

point-to-point connections

point-to-multipoint connection

both and

none of the above

SECTION

(Attempt all the very short answer type questions.)

11. Do cyber crimes occur on social networking sites like facebook? How?

12. Write a note on recommendations for secure wireless networks.

13. How do I get infected with spyware

14. Discuss e-cards.

15. Write a short note on DFS.

SECTION

(Attempt two out of three short answer type questions.)

16. How is a web service activated?

17. What is a counterfeit credit card?

18. Write the different methods used to detect and prevent the cyber-attack.

SECTION -D.

(Attempt two out of three long answer type questions.)

19. How to prevent and report credit card fraud or identify theft?

20. What is Phishing? How it works? How a user can prevent him from being a victim of phishing attack?

21. Write a descriptive note on web services security standards. Also, discuss the threats and attacks with respect to session management.


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Information Security
  • Information Technology Securtiy
  • Securing Internet Access
  • Server Security