No.
of Printed Pages : 3 I MSEI-021
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
eN1 Term-End Examination
December, 2015
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50
Note : (i) Section 'A' - Answer all objective type questions.
Section 'B' - Answer all the very short answer type
questions.
(iii)Section 'C' - Answer any two questions out of three
short answer type questions.
(iv) Section 'D' - Answer any two questions out of
three long answer type questions.
SECTION A -
Objective type question.
(Attempt all the questions)
1. It translate the program line by line : 1
(a) Interpreter (b) Compiler
(c) Executable code (d) Source code
2. helps to block undesired internet 1
traffic, from accessing your computer.
3. IDPS stands for 1
4. To protect against malicious attacks, what should 1
you think like ?
(a) Hacker (b) Network admin
(c) Spoofer (d) Auditor
MSEI-021 1 P.T.O.
5. DDOS stands for 1
6. Hub concept is used in topology. 1
(a) ring (b) star
(c) bus (d) tree
7. memory uses a hard disk, to store 1
parts of programs that are currently running and
cannot fit in RAM.
8. URL stands for 1
9. A is a type of virus that neither 1
replicates nor copies itself to anything.
10. DMZ stands for 1
SECTION B -
Very short type questions.
(Attempt all the questions)
11. What is the difference between a threat agent and 2
a tlareat ?
12. What do you understand by Port Redirection ? 2
13. Explain Phishing Attack. 2
14. What is anti-virus software ? Why it is used ? 2
15. What do you understand by Operating System 2
Hardening ?
MSEI-021 2
SECTION - C
Short answer type questions.
(Attempt 2 out of 3 short type questions)
16. Explain any three types of network attacks in 5
detail.
17. Explain ISO - OSI model with diagram and 5
explain each layer in brief.
18. Explain the concept of Information Security and 5
describe its principles.
SECTION - D
Long answer type questions.
(Attempt 2 out of 3 questions)
19. Explain the types of operating systems with 10
examples.
20. Explain the basic security threats and their 10
corrective measures in detail.
21. Write a short note on the following : 5+5
(a) Half Duplex and Full duplex mode.
(b) Cyber Crime
MSEI-021 3