0% found this document useful (0 votes)
40 views22 pages

Msei21 Pyq

ignou mscis program previous year question paper

Uploaded by

shiv pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views22 pages

Msei21 Pyq

ignou mscis program previous year question paper

Uploaded by

shiv pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

No.

of Printed Pages : 4 MSEI 021 -

P.G. DIPLOMA IN INFORMATION


SECURITY (PGDIS)
Term-End Examination
MSEI-021 : INTRODUCTION TO
INFORMATION SECURITY
Time : 2 Hours] [Maximum Marks : 50

Note: Section A answer all the objective type questions.

Section B answer all the very short answer type


questions.
Section C answer any two question out of three
short answer type questions.'
Section D answer any two questions out of three
long answer type questions.

Section A

Objective type questions


(Attempt all the questions)

1. ICMP stands for 1

2 IPS stands for 1

3. NIME stands for 1

MSEI-021 / 920./ 4
( 1 ) 1111111111111111111111111 1 11111
4. translate the program line by line.

5. Hub concept used in topology. 1

memory uses a hard disk to store parts


of programs that are currently running and cannot
fit in Ram. 1

FTP stands for

8. Black hat hackers are the hackers known as Cyber


Criminals. (a) True (b) False 1

a helps to block undesired intemet traffic from


accessing your computer. 1

10. What is the size of IPv6? 1

Section B

Very short answer type questions

(Attempt all the questions)

11. What is a virus and what are its symptoms? 2

12. What is the difference between a threat agent and


a threat? 2

13. Explain SAMBA 2

(2) MSEI-021 / 920 / 4


14. Differentiate between DOS and DDOS attacks. 2

15. Differentiate between interpreter and compiler. 2

Section C

Short answer type questions

(Attempt 2 out of 3 short answer type questions)

16. What is an operating system? Explain its functions


and any two types of OS. 5

17. Explain ISO - OSI model with diagram and explain


layers in brief. 5

18. What are the two methods for computing


password? 5

Section D

Long answer type questions

(Attempt 2 out of 3 questions)

19. Explain the basic security threats and their


corrective measures in detail. 10

MSEI-021 / 920 / 4 (3)


20. What is Malware? What kind of precautions can
be used to overcome the virus problem? 10

21. Write briefly about the signature based intrusion


detection system. 10

-x-

(4) MSEI-021 / 920 / 4


No. of Printed Pages : 4 MSEI-021
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
February, 2021

MSEI-021 : INTRODUCTION TO INFORMATION


SECURITY
Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.

SECTION A

Objective type questions. Attempt all questions.

1. NAT stands for _________ . 1

2. SNMP stands for _________ . 1

3. _________ allows file and print sharing between


computers running Windows and Linux. 1
MSEI-021 1 P.T.O.
4. _________ is the Linux file system used to format
the hard disk nowadays. 1

5. HTTPS Protocol works on the _________ layer of


OSI model. 1

6. MAC address is available on _________ layer of


OSI. 1

7. UTP stands for _________ . 1

8. Which protocol is used behind ping command ? 1

9. CSMA-CD stands for _________ . 1

10. _________ involves following a person’s


movements across the Internet by posting
messages on the bulletin boards frequented by
the victim. 1

MSEI-021 2
SECTION B

Very short answer type questions. Attempt all questions.

11. What is Data Diddling ? Explain. 2

12. Write a short note on Fiber Optics. 2

13. Explain the concept of Circuit Switching. 2

14. What do you mean by Reconnaissance ? Explain. 2

15. What are the characteristics of computers ?


Explain. 2

SECTION C

Short answer type questions. Attempt two out of three


questions.

16. Explain Firewall. What are the types of


Firewalls ? 5

17. Explain the terms Data Repositories and Email


Services. 5

18. Differentiate between Star topology and Tree


topology with diagrams. 5

MSEI-021 3 P.T.O.
SECTION D

Long answer type questions. Attempt two out of three


questions.

19. What is the difference between Virtual Storage


and Cache Memory ? Explain Data Integrity and
its types. 10

20. What is the SNMP Management Framework ?


Explain all four. 10

21. What are the types of operating systems ?


Explain any four. 10

MSEI-021 4
No. of Printed Pages : 4 MSEI-021
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
June, 2021

MSEI-021 : INTRODUCTION TO INFORMATION


SECURITY
Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the Objective Type Questions.
Section B – Answer all the Very Short Answer Type
Questions.
Section C – Answer any two questions out of three Short
Answer Type Questions.
Section D – Answer any two questions out of three Long
Answer Type Questions.

SECTION A
Objective Type Questions

Attempt all questions.

1. _________ topology is the combination of two or


more topologies. 1

2. Encryption method converts plain text into


_________ text in cryptography. 1

MSEI-021 1 P.T.O.
3. ___________ is the maximum size of packet
accepted by Windows OS in Ping command. 1

4. LDAP stands for __________ . 1

5. The MDS algorithm is a widely used hash


function producing a _________ bit hash value. 1

6. ____________ is the standardized registered jack


of Ethernet cable. 1

7. https protocol works on ____________ layer. 1

8. _________ is a multitasking operating system


that aims at executing real time applications. 1

9. USB stands for ___________ . 1

10. Programming source code gets ___________ under


Intellectual Property Rights. 1

MSEI-021 2
SECTION B
Very Short Answer Type Questions

Attempt all questions.

11. Explain Man-in-the-Middle attack with example. 2

12. Explain the concept of Payload in Malicious


Attacks. 2

13. Explain Phreaking with example. 2

14. Explain Salami Attack. 2

15. Explain Patch Management. 2

SECTION C
Short Answer Type Questions

Attempt two out of three questions.

16. Define NAT. How is it different from Bridge ?


Elaborate with example. 5

17. Explain the recommendations for controlling


Software Piracy. 5

18. Explain DHCP servers and compare with DNS


servers. 5

MSEI-021 3 P.T.O.
SECTION D
Long Answer Type Questions

Attempt two out of three questions.

19. Explain Ransomware Malware. Write its


behaviour activities. How is it different from
Trojan Horse ? 10

20. Explain CMIP, ICMP and SNMP protocols in


detail. 10

21. Explain the difference between centralized


model, partially decentralized model and fully
decentralized model used for security awareness
programme. 10

MSEI-021 4
[2] MSEI-021

2. By using encryption techniques the plain text


No. of Printed Pages : 4 MSEI-021
converts to ................ . 1
P. G. DIPLOMA IN INFORMATION 3. CMIP stands for .................. . 1
SECURITY (PGDIS)
4. Translator for low level programming language
Term-End Examination
December, 2021 were termed as ................... . 1

MSEI-021 : INTRODUCTION TO INFORMATION 5. Shell is the exclusive feature of ................. OS. 1


SECURITY
6. DDOS stands for .................... .
Time : 2 Hours Maximum Marks : 50
Note : Section A : Answer all the Objective type 7. The topology where each network host is
questions. connected to a central point in LAN is called
................ . 1
Section B : Answer all the Very short answer
type questions. 8. ............... is the unauthorized discovery and
mapping of systems, services or vulnerabilities.
Section C : Answer 2 out of 3 Short answer
1
type questions.
9. Data transmission rates are stated in terms of
Section D : Answer 2 out of 3 Long answer the ................ that can be transmitted per
type questions. second. 1

Section—A 10. A .................. refers to a skilled hacker who


Note : Attempt all objective type questions. sometimes acts legally, sometimes in good will

1. NNTP stands for .................... . 1 and sometimes not. 1

P. T. O.
[3] MSEI-021 [4] MSEI-021

Section—B Section—D
Note : Attempt all the very short answer type Note : Attempt 2 out of 3 long answer type
questions.
questions.
11. Differentiate between the following : 2 each
15. What is the difference between firewall
(a) Compiler and interpreter
intrusion detection system and intrustion
(b) Internet and extranet
(c) Threat agent and a threat prevention system ? 10

(d) Analog data transmission and digital data


16. Operating system acts as a resource manager
transmission
(e) Linux and Unix operating systems because it controls all components of the

Section—C computer. Do you agree ? Explain in detail. 10

Note : Attempt 2 out of 3 short answer type


17. Give the five basic steps used by computer
questions. hackers to gain unauthorized access over a

12. Computer virus involves various stages right computer system. 10

from its attack to elimination. Explain these

stages. 5

13. Explain any three types of network attacks in

detail. 5

14. Explain cryptography and overview of SSL

handshake. 5 MSEI–021

P. T. O.
No. of Printed Pages : 4 MSEI-021

MASTER OF SCIENCE (INFORMATION


SECURITY)/P.G. DIPLOMA IN INFORMATION
SECURITY (MSCIS/PGDIS)
Term-End Examination
June, 2022
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all Objective Type Questions.
Section B – Answer all Very Short Answer Type Questions.
Section C – Answer any two questions out of three Short
Answer Type Questions.
Section D – Answer any two questions out of three Long
Answer Type Questions.

SECTION A
Objective Type Questions

Attempt all questions.

1. The prevention against virus is to install


___________ software. 1

2. ___________ refers to the practice of registering


domain names with the desire of selling it at
higher prices. 1

MSEI-021 1 P.T.O.
3. ___________ memory uses a hard disk, to store
parts of programs that are currently running and
cannot fit in the RAM. 1

4. A __________ is a type of virus that neither


replicates nor copies itself, but causes damage or
compromises the security of the system. 1

5. An assembler is ___________ dependent. 1

6. The Network Layer Protocol of Internet is : 1


(a) Ethernet
(b) Internet Protocol
(c) Hypertext Transfer Protocol
(d) None of the above

7. Security weakness can always be entirely


eliminated. 1
(a) True
(b) False

8. What is the maximum packet size allowed to


drop ping request to the target system (when
ICMP header is considered) ? 1

9. In a general sense, security is defined as a state


of freedom from danger or risk. 1
(a) True
(b) False

10. A hash function does not provide integrity,


however, MAC provides integrity. 1
(a) True
(b) False
MSEI-021 2
SECTION B
Very Short Answer Type Questions

Attempt all questions.

11. Write a short note on Cyberbullying and E-mail


Bombing. 2

12. Explain Brute-Force Computation. 2

13. Write a short note on MIB. 2

14. Differentiate between SYN Flood and ICMP


Flood. 2

15. Explain ‘‘The Phishing Attack’’. 2

SECTION C
Short Answer Type Questions

Attempt two out of three questions.

16. Explain computer worms. 5

17. What is CSMA-CD ? Explain. 5

18. Differentiate between Phreaking and Privacy. 5

MSEI-021 3 P.T.O.
SECTION D
Long Answer Type Questions

Attempt two out of three questions.

19. Explain the need of Information Security


Awareness from a point of view of both the end
user as well as the organization. 10

20. What is SNMP management framework ? Also


define its basic components. 10

21. Explain four primary classes of threats to


network security. Differentiate between DOS and
DDOS attacks. 10

MSEI-021 4
No. of Printed Pages : 2 MSEI-021

MASTER OF SCIENCE (INFORMATION


SECURITY)/P.G. DIPLOMA IN INFORMATION
SECURITY (MSCIS/PGDIS)
Term-End Examination
December, 2022
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY
Time : 2 hours Maximum Marks : 50

Note : Question number 1 is compulsory. Attempt any


three questions from the rest.

1. (a) Computer virus involves various stages


right from its design to elimination.
Explain these stages. 5

(b) What is Network Security ? Why is it


important ? 5

(c) Explain the difference between Phreaking


and Privacy. 5

(d) What are Reconnaissance Attacks ?


Explain any four. 5

2. What is Cryptanalysis ? Explain in brief


differential and linear cryptanalysis. 10

MSEI-021 1 P.T.O.
3. What is the difference between Firewall
Intrusion Detection System and Intrusion
Prevention System ? 10

4. Give the five basic steps used by computer


hackers to gain unauthorized access over a
computer system. 10

5. Advertisers have to take extra care when


advertising for children. What are the legal and
ethical issues involved in advertising potentially
harmful products and using psychological tactics
to stimulate demand ? 10

MSEI-021 2
No. of Printed Pages : 2 MSEI-021
MASTER OF SCIENCE
(INFORMATION SECURITY)/
P. G. DIPLOMA IN INFORMATION
SECURITY
(MSCIS/PGDIS)
Term-End Examination
June, 2023
MSEI-021 : INTRODUCTION TO INFORMATION
SECURITY

Time : 2 Hours Maximum Marks : 50

Note : Question No. 1 is compulsory. Attempt any


three questions from the rest.

1. (a) What is Cryptography ? Why is it


important ? 5

(b) Explain Network Management


Architecture. 5

(c) Explain OSI model with a diagram. 5

P. T. O.
[2]

(d) What are the two methods for computing


passwords ? 5

2. Explain four primary classes of threats to


network security. Explain the difference
between DOS and DDOS attacks. 10

3. What is SNMP management framework ? Also


define its basic components. 10

4. It is the duty of the business officials and


employees to keep certain business and
personal information confidential. Suggest the
different steps to be taken for maintaining
confidentiality in any organization. 10

5. Write short notes on the following : 5+5

(a) File Server

(b) Firewall

MSEI–021

You might also like