Exam Details
Subject | Introduction to Information Security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. It translate the program line by line:
Interpreter
Compiler
Executable code
Source code
2. helps to block undesired internet 1 traffic, from accessing your computer.
3. IDPS stands for
4. To protect against malicious attacks, what should you think like
Hacker
Network admin
Spoofer
Auditor
5. DDOS stands for
6. Hub concept is used in topology.
ring
star
bus
tree
7. memory uses a hard disk, to store parts of programs that are currently running and cannot fit in RAM.
8. URL stands for
9. A is a type of virus that neither replicates nor copies itself to anything.
10. DMZ stands for
SECTION
Very short type questions.
(Attempt all the questions)
11. What is the difference between a threat agent and a threat?
12. What do you understand by Port Redirection?
13. Explain Phishing Attack.
14. What is anti-virus software? Why it is used
15. What do you understand by Operating System 2 Hardening?
16. Explain any three types of network attacks in detail.
17. Explain ISO -051 model with diagram and explain each layer in brief.
18. Explain the concept of Information Security and 5 describe its principles.
19. Explain the types of operating systems with examples.
20. Explain the basic security threats and their corrective measures in detail.
21. Write a short note on the following:
Half Duplex and Full duplex mode.
Cyber Crime
Interpreter
Compiler
Executable code
Source code
2. helps to block undesired internet 1 traffic, from accessing your computer.
3. IDPS stands for
4. To protect against malicious attacks, what should you think like
Hacker
Network admin
Spoofer
Auditor
5. DDOS stands for
6. Hub concept is used in topology.
ring
star
bus
tree
7. memory uses a hard disk, to store parts of programs that are currently running and cannot fit in RAM.
8. URL stands for
9. A is a type of virus that neither replicates nor copies itself to anything.
10. DMZ stands for
SECTION
Very short type questions.
(Attempt all the questions)
11. What is the difference between a threat agent and a threat?
12. What do you understand by Port Redirection?
13. Explain Phishing Attack.
14. What is anti-virus software? Why it is used
15. What do you understand by Operating System 2 Hardening?
16. Explain any three types of network attacks in detail.
17. Explain ISO -051 model with diagram and explain each layer in brief.
18. Explain the concept of Information Security and 5 describe its principles.
19. Explain the types of operating systems with examples.
20. Explain the basic security threats and their corrective measures in detail.
21. Write a short note on the following:
Half Duplex and Full duplex mode.
Cyber Crime
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws