Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views3 pages

DEC15

IGNOU Question Papers MSEI-021

Uploaded by

v62v86d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

DEC15

IGNOU Question Papers MSEI-021

Uploaded by

v62v86d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

No.

of Printed Pages : 3 I MSEI-021


P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)

eN1 Term-End Examination


December, 2015

MSEI-021 : INTRODUCTION TO INFORMATION


SECURITY
Time : 2 hours Maximum Marks : 50
Note : (i) Section 'A' - Answer all objective type questions.
Section 'B' - Answer all the very short answer type
questions.
(iii)Section 'C' - Answer any two questions out of three
short answer type questions.
(iv) Section 'D' - Answer any two questions out of
three long answer type questions.

SECTION A -

Objective type question.


(Attempt all the questions)
1. It translate the program line by line : 1
(a) Interpreter (b) Compiler
(c) Executable code (d) Source code
2. helps to block undesired internet 1
traffic, from accessing your computer.
3. IDPS stands for 1

4. To protect against malicious attacks, what should 1


you think like ?
(a) Hacker (b) Network admin
(c) Spoofer (d) Auditor

MSEI-021 1 P.T.O.
5. DDOS stands for 1

6. Hub concept is used in topology. 1


(a) ring (b) star
(c) bus (d) tree

7. memory uses a hard disk, to store 1


parts of programs that are currently running and
cannot fit in RAM.

8. URL stands for 1

9. A is a type of virus that neither 1


replicates nor copies itself to anything.

10. DMZ stands for 1

SECTION B -

Very short type questions.


(Attempt all the questions)
11. What is the difference between a threat agent and 2
a tlareat ?

12. What do you understand by Port Redirection ? 2

13. Explain Phishing Attack. 2

14. What is anti-virus software ? Why it is used ? 2

15. What do you understand by Operating System 2


Hardening ?

MSEI-021 2
SECTION - C
Short answer type questions.
(Attempt 2 out of 3 short type questions)
16. Explain any three types of network attacks in 5
detail.

17. Explain ISO - OSI model with diagram and 5


explain each layer in brief.

18. Explain the concept of Information Security and 5


describe its principles.

SECTION - D
Long answer type questions.
(Attempt 2 out of 3 questions)
19. Explain the types of operating systems with 10
examples.

20. Explain the basic security threats and their 10


corrective measures in detail.

21. Write a short note on the following : 5+5


(a) Half Duplex and Full duplex mode.
(b) Cyber Crime

MSEI-021 3

You might also like