Exam Details

Subject Securing Internet Access
Paper
Exam / Course Advanced Certificate in Information Security (ACISE)
Department School of Vocational Education and Training (SOVET)
Organization indira gandhi national open university
Position
Exam Date December, 2015
City, State new delhi,


Question Paper

1. A is anything that can cause harm.

Vulnerability

Phishing

Threat

Spoof

2. A hacker contacts you on phone or e-mail and attempts to acquire your password is called

Spoofing

Phishing

Spamming

Bugging

3. What is the name for the router that your PC uses to connect to your internet service provider

Loopback address

Backbone

IP address

Default Gateway

4. A virtual private network creates a through the internet.

Tunnel

BRI

Connection

SSH session

5. To check to see if the web server you are trying to reach is available or it is down, which command line utility should be used

PING

ICS

Telnet

NNTP

6. A protocol used to control the secure sending of data on the internet is

SMTP

HTTPS

TCP/IP

HTTP

7. Which organization defines the Web standards?

Apple Inc.

World Wide Web Consortium (W3C).

Microsoft corporation.

IBM corporation.

8. The bluetooth supports:

Point -to -point connections.

Point -to -multipoint connections.

Both and

None of the above.

9. What is WPA

Wi-fi Protected Access.

Wired Protected Access.

Wired Process Access.

Wi-fi Process Access.

10. What is Wired Equivalent Privacy

Security algorithm for ethernet.

Security algorithm for wireless networks.

Security algorithm for USB communication.

None of the above.

11. What is a computer security incident?

12. What is bluetooth technology? Explain.

13. What are the different mediums of doing the internet transactions

14. Write about the functions of firewall.

15. What are the disadvantages of log,files

16. What is cyber forensics How digital evidence does play a key role in the investigation of the cyber crime

17. Explain Digital Incident Response.

18. How does Credit Card fraud occur

19. What are the security issues in the social networking sites

20. What is cyber crime? Explain the classification of cyber crime.

21. What do you understand by the term phishing How can one recognize phishing and fake websites Discuss in brief the safety measures against phishing.


Departments

  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • Centre for Corporate Education, Training & Consultancy (CCETC)
  • National Centre for Disability Studies (NCDS)
  • School of Agriculture (SOA)
  • School of Computer and Information Sciences (SOCIS)
  • School of Continuing Education (SOCE)
  • School of Education (SOE)
  • School of Engineering & Technology (SOET)
  • School of Extension and Development Studies (SOEDS)
  • School of Foreign Languages (SOFL)
  • School of Gender Development Studies(SOGDS)
  • School of Health Science (SOHS)
  • School of Humanities (SOH)
  • School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
  • School of Journalism and New Media Studies (SOJNMS)
  • School of Law (SOL)
  • School of Management Studies (SOMS)
  • School of Performing Arts and Visual Arts (SOPVA)
  • School of Performing Arts and Visual Arts(SOPVA)
  • School of Sciences (SOS)
  • School of Social Sciences (SOSS)
  • School of Social Work (SOSW)
  • School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
  • School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
  • School of Translation Studies and Training (SOTST)
  • School of Vocational Education and Training (SOVET)
  • Staff Training & Research in Distance Education (STRIDE)

Subjects

  • Information Security
  • Information Technology Securtiy
  • Securing Internet Access
  • Server Security