Exam Details

Subject Application and business Security developments
Paper
Exam / Course PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date December, 2015
City, State new delhi,


Question Paper

1. Encryption is the process of encoded the data in another form.

True

False

2. HTML, XML and Flash are the header of C programming language.

True

False

3. Firewalls are designed to perform all the following except:

Limiting security exposures

Logging Internet activity

Enforcing organization security policy

Protecting against viruses

4. What does CSS stands for?

Cascadding Style Sheets

Computer Style Sheets

Creative Style Sheets

Colourful Style Sheets

5. Which one of the following protocol is used to receive mail messages

SMTP

Post Office Protocol

Internet message access protocol

All of the above

6. One of the most widely used Public Key algorithm today is called:

PKI

RSA

SSL

Hash Code

7. In a infrastructure, a system of server that freely distribute key to anyone would be established and maintained.

Asymmetric key

Public key

PCP key

Private key

8. John is a network administrator. He advise server administrator of company to implement blacklisting, closing open relays and strong authentication which threat he is addressing

Viruses

Adware

Spam

Spyware

9. Which of the following standard applies to e-mail as a message handling protocol

X.800

X.509

X.500

X.400

10. TLS stands for

Transport Layer Superior

Transport Layer Security

Transport Layer Supervisor

Transport Layer Secure

11. Explain Structured Coding Technique used in application.

12. What is difference between SMTP and POP?

13. What are two forms of error handling?

14. Define Transport Layer Security.

15. What is impact of fraud on business organization?

16. What do you understand by authorization and authentication? Why they are necessary

17. Define cryptography with suitable example.

18. How network security is provided on network? Explain.

19. Explain characteristics of firewall. How it is helpful in providing security in network?

20. Why we need to secure application server and database server? What are the roles to protect from the outside attack?

21. Write short notes on the following:

SQL Injection Attack

Network Security

Log File

Hacking

White Hacker


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Application and business Security developments
  • Bcp, dr planning and audit
  • Cyber security
  • Digital forensics
  • Introduction to Information Security
  • Network security
  • Policy, Standards And Laws