Exam Details
Subject | Application and business Security developments | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. Encryption is the process of encoded the data in another form.
True
False
2. HTML, XML and Flash are the header of C programming language.
True
False
3. Firewalls are designed to perform all the following except:
Limiting security exposures
Logging Internet activity
Enforcing organization security policy
Protecting against viruses
4. What does CSS stands for?
Cascadding Style Sheets
Computer Style Sheets
Creative Style Sheets
Colourful Style Sheets
5. Which one of the following protocol is used to receive mail messages
SMTP
Post Office Protocol
Internet message access protocol
All of the above
6. One of the most widely used Public Key algorithm today is called:
PKI
RSA
SSL
Hash Code
7. In a infrastructure, a system of server that freely distribute key to anyone would be established and maintained.
Asymmetric key
Public key
PCP key
Private key
8. John is a network administrator. He advise server administrator of company to implement blacklisting, closing open relays and strong authentication which threat he is addressing
Viruses
Adware
Spam
Spyware
9. Which of the following standard applies to e-mail as a message handling protocol
X.800
X.509
X.500
X.400
10. TLS stands for
Transport Layer Superior
Transport Layer Security
Transport Layer Supervisor
Transport Layer Secure
11. Explain Structured Coding Technique used in application.
12. What is difference between SMTP and POP?
13. What are two forms of error handling?
14. Define Transport Layer Security.
15. What is impact of fraud on business organization?
16. What do you understand by authorization and authentication? Why they are necessary
17. Define cryptography with suitable example.
18. How network security is provided on network? Explain.
19. Explain characteristics of firewall. How it is helpful in providing security in network?
20. Why we need to secure application server and database server? What are the roles to protect from the outside attack?
21. Write short notes on the following:
SQL Injection Attack
Network Security
Log File
Hacking
White Hacker
True
False
2. HTML, XML and Flash are the header of C programming language.
True
False
3. Firewalls are designed to perform all the following except:
Limiting security exposures
Logging Internet activity
Enforcing organization security policy
Protecting against viruses
4. What does CSS stands for?
Cascadding Style Sheets
Computer Style Sheets
Creative Style Sheets
Colourful Style Sheets
5. Which one of the following protocol is used to receive mail messages
SMTP
Post Office Protocol
Internet message access protocol
All of the above
6. One of the most widely used Public Key algorithm today is called:
PKI
RSA
SSL
Hash Code
7. In a infrastructure, a system of server that freely distribute key to anyone would be established and maintained.
Asymmetric key
Public key
PCP key
Private key
8. John is a network administrator. He advise server administrator of company to implement blacklisting, closing open relays and strong authentication which threat he is addressing
Viruses
Adware
Spam
Spyware
9. Which of the following standard applies to e-mail as a message handling protocol
X.800
X.509
X.500
X.400
10. TLS stands for
Transport Layer Superior
Transport Layer Security
Transport Layer Supervisor
Transport Layer Secure
11. Explain Structured Coding Technique used in application.
12. What is difference between SMTP and POP?
13. What are two forms of error handling?
14. Define Transport Layer Security.
15. What is impact of fraud on business organization?
16. What do you understand by authorization and authentication? Why they are necessary
17. Define cryptography with suitable example.
18. How network security is provided on network? Explain.
19. Explain characteristics of firewall. How it is helpful in providing security in network?
20. Why we need to secure application server and database server? What are the roles to protect from the outside attack?
21. Write short notes on the following:
SQL Injection Attack
Network Security
Log File
Hacking
White Hacker
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws