Exam Details
Subject | Securing Internet Access | |
Paper | ||
Exam / Course | Advanced Certificate in Information Security (ACISE) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. A is anything that can cause harm.
Vulnerability
Phishing
Threat
Spoof
2. A hacker contacts you on phone or e-mail and attempts to acquire your password is called
Spoofing
Phishing
Spamming
Bugging
3. What is the name for the router that your PC uses to connect to your internet service provider
Loopback address
Backbone
IP address
Default Gateway
4. A virtual private network creates a through the internet.
Tunnel
BRI
Connection
SSH session
5. To check to see if the web server you are trying to reach is available or it is down, which command line utility should be used
PING
ICS
Telnet
NNTP
6. A protocol used to control the secure sending of data on the internet is
SMTP
HTTPS
TCP/IP
HTTP
7. Which organization defines the Web standards?
Apple Inc.
World Wide Web Consortium (W3C).
Microsoft corporation.
IBM corporation.
8. The bluetooth supports:
Point -to -point connections.
Point -to -multipoint connections.
Both and
None of the above.
9. What is WPA
Wi-fi Protected Access.
Wired Protected Access.
Wired Process Access.
Wi-fi Process Access.
10. What is Wired Equivalent Privacy
Security algorithm for ethernet.
Security algorithm for wireless networks.
Security algorithm for USB communication.
None of the above.
11. What is a computer security incident?
12. What is bluetooth technology? Explain.
13. What are the different mediums of doing the internet transactions
14. Write about the functions of firewall.
15. What are the disadvantages of log,files
16. What is cyber forensics How digital evidence does play a key role in the investigation of the cyber crime
17. Explain Digital Incident Response.
18. How does Credit Card fraud occur
19. What are the security issues in the social networking sites
20. What is cyber crime? Explain the classification of cyber crime.
21. What do you understand by the term phishing How can one recognize phishing and fake websites Discuss in brief the safety measures against phishing.
Vulnerability
Phishing
Threat
Spoof
2. A hacker contacts you on phone or e-mail and attempts to acquire your password is called
Spoofing
Phishing
Spamming
Bugging
3. What is the name for the router that your PC uses to connect to your internet service provider
Loopback address
Backbone
IP address
Default Gateway
4. A virtual private network creates a through the internet.
Tunnel
BRI
Connection
SSH session
5. To check to see if the web server you are trying to reach is available or it is down, which command line utility should be used
PING
ICS
Telnet
NNTP
6. A protocol used to control the secure sending of data on the internet is
SMTP
HTTPS
TCP/IP
HTTP
7. Which organization defines the Web standards?
Apple Inc.
World Wide Web Consortium (W3C).
Microsoft corporation.
IBM corporation.
8. The bluetooth supports:
Point -to -point connections.
Point -to -multipoint connections.
Both and
None of the above.
9. What is WPA
Wi-fi Protected Access.
Wired Protected Access.
Wired Process Access.
Wi-fi Process Access.
10. What is Wired Equivalent Privacy
Security algorithm for ethernet.
Security algorithm for wireless networks.
Security algorithm for USB communication.
None of the above.
11. What is a computer security incident?
12. What is bluetooth technology? Explain.
13. What are the different mediums of doing the internet transactions
14. Write about the functions of firewall.
15. What are the disadvantages of log,files
16. What is cyber forensics How digital evidence does play a key role in the investigation of the cyber crime
17. Explain Digital Incident Response.
18. How does Credit Card fraud occur
19. What are the security issues in the social networking sites
20. What is cyber crime? Explain the classification of cyber crime.
21. What do you understand by the term phishing How can one recognize phishing and fake websites Discuss in brief the safety measures against phishing.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Information Security
- Information Technology Securtiy
- Securing Internet Access
- Server Security