Exam Details
Subject | Cyber security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. A distributed database has which of the following advantages over a centralized database
Software cost
Software complexity
Slow response
Modular growth
2. Data security threats include:
hardware failure
Privacy invasion
Fraudulent manipulation of data
All of the above
3. The last address of IP address represents address.
4. Sniffing is a technique that could be used to capture network user
5. Computers which stores the different web pages is called as
6. Which of the following is the greatest risk when it comes to removable storage?
Integrity of data
Availability of data
Confidentiality of data
Accountability of data
7. When a system completely secure?
When it is updated
When it is assessed for vulnerabilities
When all anomalies have been removed
Never
8. Which of the following items are not necessary for client/server?
Assure that tools will connect with middle ware.
Understand the requirements.
Determine network bandwidth capabilities.
Include the use of a file server.
9. A distributed database can use which of the following strategies?
Totally centralized at one location and accessed by many sites.
Partially or totally replicated across sites.
Partitioned into segments at different sites.
All of the above
10. A is structured collection of data.
11. List out the ACID properties.
12. What are the characteristics of a client/server architecture
13. Explain the significance of cluster table.
14. What is Distributed Processing?
15. What is meant by security attacks?
16. Explain the architecture of Oracle Database Management System.
17. What is the purpose and uses of Trojan Horse?
18. Explain the role of operating system in network security.
19. Discuss the advantages of three -tier client server architecture over two -tier client server architecture.
20. What are the different security issues in the Social Networking Sites?
21. What do you mean by intruder? Explain the various intrusion techniques in detail.
Software cost
Software complexity
Slow response
Modular growth
2. Data security threats include:
hardware failure
Privacy invasion
Fraudulent manipulation of data
All of the above
3. The last address of IP address represents address.
4. Sniffing is a technique that could be used to capture network user
5. Computers which stores the different web pages is called as
6. Which of the following is the greatest risk when it comes to removable storage?
Integrity of data
Availability of data
Confidentiality of data
Accountability of data
7. When a system completely secure?
When it is updated
When it is assessed for vulnerabilities
When all anomalies have been removed
Never
8. Which of the following items are not necessary for client/server?
Assure that tools will connect with middle ware.
Understand the requirements.
Determine network bandwidth capabilities.
Include the use of a file server.
9. A distributed database can use which of the following strategies?
Totally centralized at one location and accessed by many sites.
Partially or totally replicated across sites.
Partitioned into segments at different sites.
All of the above
10. A is structured collection of data.
11. List out the ACID properties.
12. What are the characteristics of a client/server architecture
13. Explain the significance of cluster table.
14. What is Distributed Processing?
15. What is meant by security attacks?
16. Explain the architecture of Oracle Database Management System.
17. What is the purpose and uses of Trojan Horse?
18. Explain the role of operating system in network security.
19. Discuss the advantages of three -tier client server architecture over two -tier client server architecture.
20. What are the different security issues in the Social Networking Sites?
21. What do you mean by intruder? Explain the various intrusion techniques in detail.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws