SAMPLE QUESTION PAPER 1(INTERNET SECURITY
MANAGEMENT CONCEPTS,INFORMATION PRIVACY AND COPYRIGHT ISSUES)
Multiple Choice :-
1.Take
the odd item out.
i)
Pretending
ii)
Denial
of Service
iii)
Manipulation
iv) Win2000
2.
Which out of the following is not a benefit of using a firewall?
i) Access to host in the
network can be strictly controlled.
ii) Logging and statistics, use
and misuse.
iii) Security is concentrated
on a single firewall system leading to better implementation of authentication
procedures.
iv) All of the above
3.
The key fields which are tested by a Packet filtering firewall are:
i) Source IP address
ii) TCP/UDP Source port
iii) Destination IP address
iv) All of the above
4.
Tick the odd item out:
i)Stageful
Inspection
ii)Proxy
firewall
iii)Alta Vista
iv)Packet-Filtering
firewall
5.
Choose the term not applicable for authentication methods:
i) One time password system
ii) Challenge/Response system
iii) RADIUS
iv) None of the above
6.
Which of the following is related to internet security?
i) MIT
ii) Firewall
iii) DSL
iv) W3C
7.
Which of the following is not a type of firewall?
i) Packet-filtering firewall
ii) Proxy firewall
iii) Stageful Inspection
iv) None of the above
8.
What is SSL(Secure Socket Layer)?
i) The IP Protocol to dynamically
assign IP addresses.
ii) It is a Web authoring tool
iii) It allows secure
connection
iv) It is a scripting language
9.
Networks are vulnerable to computer crime like:
i)Theft, Vandalism and graffiti
ii)Hacking, Viruses and software piracy
iii)Internet addiction, sabotage and negligence
iv)None of the above
10.
A proxy server is used as the computer:
i)With external access
ii)Acting as a backup
iii)Performing file handling
iv)Accessing user permissions
State whether the following statements are True or False:-
1) The pretence by a user to
be a different user in order to gain access to information or to acquire
additional privileges is a threat to Internet security.
2) The replacement ,insertion
,deletion or disordering of user data during a communication by an unauthorized
user does not form a part of Internet security.
3) Protection from services,
which are inherently more prone to attacks, is one of the benefits of using a
firewall.
4) The TCP/UDP ports are used
by the application services like FTP, TELNET, HTTP, etc., to communicate on the
network.
5) The proxy service hides
the internal host and service.
6) Password is the method of
authentication.
7) Confidentially, integrity
and availability are basic requirements of Internet security.
8) In copyright, only
expression is protected, not facts or ideas.
9) Firewall is hardware or
software designed to protect against network hackers.
10)Firewalls cannot protect computer against
viruses.
11)The process of translating information
from its original form into an encoded incomprehensible form
is called encryption.
Match the following :-
1.
Traffic analysis a. Firewall
2. Firewalls b. Application gateway
and packet filtering
firewalls.
3.Proxy
server c. Advance
authentication
Measures.
4.Robust
security d. Internet security
Threats
5.Good
firewall e. Prohibit anyone to
causing damages.
6.Free
firewall f. Secret code
7.Encryption g. Zonal Alarm 2.0
8.Scrambling of
a h. Key
message for security.
9.To confirm the
identity i. Trojan Horse
of a computer user.
10.A message from
a trus j. authentication
-ted authority that is used
during a secure transmission.
11.A string which
is used to k. Digital certificate
encrypt data to keep it
secure.
12.A security
attack in which l. Encryption
someone inside a company
is tricked into running a
computer Program that
sends information from
the person’s computer
to an outsider.
Fill in the blanks :-
a)
Firewall f) Authorization
b)
Hacker
g) Auditing
c)
Source
IP address
h) Callback
d)
Flexible
i) Encryption
e)
Remote
procedure call(RPC) j)
Stageful Inspection
1. _______key
field is tested in the packet filtering.
2. Packet
filtering firewalls do not handle_______.
3. A good
firewall system should be_______.
4. _______is one
type of firewall.
5. _______is the
process of test whether an authorized use is permitted to use resources or not.
6. _______is a
security feature.
7. Collection and
analysis of data is called_______.
8. _______is a
computer enthusiast or expert who gains unauthorized access to computer systems
for the purpose of stealing and corrupting data.
9. The process of
translating information from its original form into an encoded,
incomprehensible form is called_______.
10. _______stops
unwanted traffic from entering the network.
Descriptive Type Questions:-
1.What do you mean by the term firewall? What are the
different types of firewalls available for network protection? Describe any
one.
2. Write short notes on the following:
a. Benefits of
using a firewall.
b. Advantages
of application gateway.
3. Define the terms authentication, authorization and
accounting. What are the various methods of authentication? Describe each one
of them.
4. What are the benefits of firewall?
5. What are the Internet security threats? What constitutes
a good firewall system?
6. What is encryption? Explain the Public Key
Encryption technique.
7. Describe in brief the actions (any five) that you
will take to protect your PC that is networked against virus invasion.
8. Write short notes on proxy server and Internet
security.
9. What is the difference between dynamic and static
web sites?
10. What are the copyright issues? Explain.
11. What is asymmetric crypt o system?
12. Discuss the significance of private key and public
key while encrypting a message with the help of examples.
No comments:
Post a Comment