No.
of Printed Pages : 4 MSEI 021 -
P.G. DIPLOMA IN INFORMATION
SECURITY (PGDIS)
Term-End Examination
MSEI-021 : INTRODUCTION TO
INFORMATION SECURITY
Time : 2 Hours] [Maximum Marks : 50
Note: Section A answer all the objective type questions.
Section B answer all the very short answer type
questions.
Section C answer any two question out of three
short answer type questions.'
Section D answer any two questions out of three
long answer type questions.
Section A
Objective type questions
(Attempt all the questions)
1. ICMP stands for 1
2 IPS stands for 1
3. NIME stands for 1
MSEI-021 / 920./ 4
( 1 ) 1111111111111111111111111 1 11111
4. translate the program line by line.
5. Hub concept used in topology. 1
memory uses a hard disk to store parts
of programs that are currently running and cannot
fit in Ram. 1
FTP stands for
8. Black hat hackers are the hackers known as Cyber
Criminals. (a) True (b) False 1
a helps to block undesired intemet traffic from
accessing your computer. 1
10. What is the size of IPv6? 1
Section B
Very short answer type questions
(Attempt all the questions)
11. What is a virus and what are its symptoms? 2
12. What is the difference between a threat agent and
a threat? 2
13. Explain SAMBA 2
(2) MSEI-021 / 920 / 4
14. Differentiate between DOS and DDOS attacks. 2
15. Differentiate between interpreter and compiler. 2
Section C
Short answer type questions
(Attempt 2 out of 3 short answer type questions)
16. What is an operating system? Explain its functions
and any two types of OS. 5
17. Explain ISO - OSI model with diagram and explain
layers in brief. 5
18. What are the two methods for computing
password? 5
Section D
Long answer type questions
(Attempt 2 out of 3 questions)
19. Explain the basic security threats and their
corrective measures in detail. 10
MSEI-021 / 920 / 4 (3)
20. What is Malware? What kind of precautions can
be used to overcome the virus problem? 10
21. Write briefly about the signature based intrusion
detection system. 10
-x-
(4) MSEI-021 / 920 / 4
No. of Printed Pages : 4 MSEI-021
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
February, 2021
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.
SECTION A
Objective type questions. Attempt all questions.
1. NAT stands for _________ . 1
2. SNMP stands for _________ . 1
3. _________ allows file and print sharing between
computers running Windows and Linux. 1
MSEI-021 1 P.T.O.
4. _________ is the Linux file system used to format
the hard disk nowadays. 1
5. HTTPS Protocol works on the _________ layer of
OSI model. 1
6. MAC address is available on _________ layer of
OSI. 1
7. UTP stands for _________ . 1
8. Which protocol is used behind ping command ? 1
9. CSMA-CD stands for _________ . 1
10. _________ involves following a person’s
movements across the Internet by posting
messages on the bulletin boards frequented by
the victim. 1
MSEI-021 2
SECTION B
Very short answer type questions. Attempt all questions.
11. What is Data Diddling ? Explain. 2
12. Write a short note on Fiber Optics. 2
13. Explain the concept of Circuit Switching. 2
14. What do you mean by Reconnaissance ? Explain. 2
15. What are the characteristics of computers ?
Explain. 2
SECTION C
Short answer type questions. Attempt two out of three
questions.
16. Explain Firewall. What are the types of
Firewalls ? 5
17. Explain the terms Data Repositories and Email
Services. 5
18. Differentiate between Star topology and Tree
topology with diagrams. 5
MSEI-021 3 P.T.O.
SECTION D
Long answer type questions. Attempt two out of three
questions.
19. What is the difference between Virtual Storage
and Cache Memory ? Explain Data Integrity and
its types. 10
20. What is the SNMP Management Framework ?
Explain all four. 10
21. What are the types of operating systems ?
Explain any four. 10
MSEI-021 4
No. of Printed Pages : 4 MSEI-021
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
June, 2021
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the Objective Type Questions.
Section B – Answer all the Very Short Answer Type
Questions.
Section C – Answer any two questions out of three Short
Answer Type Questions.
Section D – Answer any two questions out of three Long
Answer Type Questions.
SECTION A
Objective Type Questions
Attempt all questions.
1. _________ topology is the combination of two or
more topologies. 1
2. Encryption method converts plain text into
_________ text in cryptography. 1
MSEI-021 1 P.T.O.
3. ___________ is the maximum size of packet
accepted by Windows OS in Ping command. 1
4. LDAP stands for __________ . 1
5. The MDS algorithm is a widely used hash
function producing a _________ bit hash value. 1
6. ____________ is the standardized registered jack
of Ethernet cable. 1
7. https protocol works on ____________ layer. 1
8. _________ is a multitasking operating system
that aims at executing real time applications. 1
9. USB stands for ___________ . 1
10. Programming source code gets ___________ under
Intellectual Property Rights. 1
MSEI-021 2
SECTION B
Very Short Answer Type Questions
Attempt all questions.
11. Explain Man-in-the-Middle attack with example. 2
12. Explain the concept of Payload in Malicious
Attacks. 2
13. Explain Phreaking with example. 2
14. Explain Salami Attack. 2
15. Explain Patch Management. 2
SECTION C
Short Answer Type Questions
Attempt two out of three questions.
16. Define NAT. How is it different from Bridge ?
Elaborate with example. 5
17. Explain the recommendations for controlling
Software Piracy. 5
18. Explain DHCP servers and compare with DNS
servers. 5
MSEI-021 3 P.T.O.
SECTION D
Long Answer Type Questions
Attempt two out of three questions.
19. Explain Ransomware Malware. Write its
behaviour activities. How is it different from
Trojan Horse ? 10
20. Explain CMIP, ICMP and SNMP protocols in
detail. 10
21. Explain the difference between centralized
model, partially decentralized model and fully
decentralized model used for security awareness
programme. 10
MSEI-021 4
[2] MSEI-021
2. By using encryption techniques the plain text
No. of Printed Pages : 4 MSEI-021
converts to ................ . 1
P. G. DIPLOMA IN INFORMATION 3. CMIP stands for .................. . 1
SECURITY (PGDIS)
4. Translator for low level programming language
Term-End Examination
December, 2021 were termed as ................... . 1
MSEI-021 : INTRODUCTION TO INFORMATION 5. Shell is the exclusive feature of ................. OS. 1
SECURITY
6. DDOS stands for .................... .
Time : 2 Hours Maximum Marks : 50
Note : Section A : Answer all the Objective type 7. The topology where each network host is
questions. connected to a central point in LAN is called
................ . 1
Section B : Answer all the Very short answer
type questions. 8. ............... is the unauthorized discovery and
mapping of systems, services or vulnerabilities.
Section C : Answer 2 out of 3 Short answer
1
type questions.
9. Data transmission rates are stated in terms of
Section D : Answer 2 out of 3 Long answer the ................ that can be transmitted per
type questions. second. 1
Section—A 10. A .................. refers to a skilled hacker who
Note : Attempt all objective type questions. sometimes acts legally, sometimes in good will
1. NNTP stands for .................... . 1 and sometimes not. 1
P. T. O.
[3] MSEI-021 [4] MSEI-021
Section—B Section—D
Note : Attempt all the very short answer type Note : Attempt 2 out of 3 long answer type
questions.
questions.
11. Differentiate between the following : 2 each
15. What is the difference between firewall
(a) Compiler and interpreter
intrusion detection system and intrustion
(b) Internet and extranet
(c) Threat agent and a threat prevention system ? 10
(d) Analog data transmission and digital data
16. Operating system acts as a resource manager
transmission
(e) Linux and Unix operating systems because it controls all components of the
Section—C computer. Do you agree ? Explain in detail. 10
Note : Attempt 2 out of 3 short answer type
17. Give the five basic steps used by computer
questions. hackers to gain unauthorized access over a
12. Computer virus involves various stages right computer system. 10
from its attack to elimination. Explain these
stages. 5
13. Explain any three types of network attacks in
detail. 5
14. Explain cryptography and overview of SSL
handshake. 5 MSEI–021
P. T. O.
No. of Printed Pages : 4 MSEI-021
MASTER OF SCIENCE (INFORMATION
SECURITY)/P.G. DIPLOMA IN INFORMATION
SECURITY (MSCIS/PGDIS)
Term-End Examination
June, 2022
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all Objective Type Questions.
Section B – Answer all Very Short Answer Type Questions.
Section C – Answer any two questions out of three Short
Answer Type Questions.
Section D – Answer any two questions out of three Long
Answer Type Questions.
SECTION A
Objective Type Questions
Attempt all questions.
1. The prevention against virus is to install
___________ software. 1
2. ___________ refers to the practice of registering
domain names with the desire of selling it at
higher prices. 1
MSEI-021 1 P.T.O.
3. ___________ memory uses a hard disk, to store
parts of programs that are currently running and
cannot fit in the RAM. 1
4. A __________ is a type of virus that neither
replicates nor copies itself, but causes damage or
compromises the security of the system. 1
5. An assembler is ___________ dependent. 1
6. The Network Layer Protocol of Internet is : 1
(a) Ethernet
(b) Internet Protocol
(c) Hypertext Transfer Protocol
(d) None of the above
7. Security weakness can always be entirely
eliminated. 1
(a) True
(b) False
8. What is the maximum packet size allowed to
drop ping request to the target system (when
ICMP header is considered) ? 1
9. In a general sense, security is defined as a state
of freedom from danger or risk. 1
(a) True
(b) False
10. A hash function does not provide integrity,
however, MAC provides integrity. 1
(a) True
(b) False
MSEI-021 2
SECTION B
Very Short Answer Type Questions
Attempt all questions.
11. Write a short note on Cyberbullying and E-mail
Bombing. 2
12. Explain Brute-Force Computation. 2
13. Write a short note on MIB. 2
14. Differentiate between SYN Flood and ICMP
Flood. 2
15. Explain ‘‘The Phishing Attack’’. 2
SECTION C
Short Answer Type Questions
Attempt two out of three questions.
16. Explain computer worms. 5
17. What is CSMA-CD ? Explain. 5
18. Differentiate between Phreaking and Privacy. 5
MSEI-021 3 P.T.O.
SECTION D
Long Answer Type Questions
Attempt two out of three questions.
19. Explain the need of Information Security
Awareness from a point of view of both the end
user as well as the organization. 10
20. What is SNMP management framework ? Also
define its basic components. 10
21. Explain four primary classes of threats to
network security. Differentiate between DOS and
DDOS attacks. 10
MSEI-021 4
No. of Printed Pages : 2 MSEI-021
MASTER OF SCIENCE (INFORMATION
SECURITY)/P.G. DIPLOMA IN INFORMATION
SECURITY (MSCIS/PGDIS)
Term-End Examination
December, 2022
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50
Note : Question number 1 is compulsory. Attempt any
three questions from the rest.
1. (a) Computer virus involves various stages
right from its design to elimination.
Explain these stages. 5
(b) What is Network Security ? Why is it
important ? 5
(c) Explain the difference between Phreaking
and Privacy. 5
(d) What are Reconnaissance Attacks ?
Explain any four. 5
2. What is Cryptanalysis ? Explain in brief
differential and linear cryptanalysis. 10
MSEI-021 1 P.T.O.
3. What is the difference between Firewall
Intrusion Detection System and Intrusion
Prevention System ? 10
4. Give the five basic steps used by computer
hackers to gain unauthorized access over a
computer system. 10
5. Advertisers have to take extra care when
advertising for children. What are the legal and
ethical issues involved in advertising potentially
harmful products and using psychological tactics
to stimulate demand ? 10
MSEI-021 2
No. of Printed Pages : 2 MSEI-021
MASTER OF SCIENCE
(INFORMATION SECURITY)/
P. G. DIPLOMA IN INFORMATION
SECURITY
(MSCIS/PGDIS)
Term-End Examination
June, 2023
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 Hours Maximum Marks : 50
Note : Question No. 1 is compulsory. Attempt any
three questions from the rest.
1. (a) What is Cryptography ? Why is it
important ? 5
(b) Explain Network Management
Architecture. 5
(c) Explain OSI model with a diagram. 5
P. T. O.
[2]
(d) What are the two methods for computing
passwords ? 5
2. Explain four primary classes of threats to
network security. Explain the difference
between DOS and DDOS attacks. 10
3. What is SNMP management framework ? Also
define its basic components. 10
4. It is the duty of the business officials and
employees to keep certain business and
personal information confidential. Suggest the
different steps to be taken for maintaining
confidentiality in any organization. 10
5. Write short notes on the following : 5+5
(a) File Server
(b) Firewall
MSEI–021