Friday, April 2, 2021

Sample Paper of O Level Set-1 (Internet Technology and Web Design)

 

SAMPLE QUESTION PAPER 1(INTERNET SECURITY MANAGEMENT CONCEPTS,INFORMATION PRIVACY AND COPYRIGHT ISSUES)

Multiple Choice :-

 

1.Take the odd item out.

i)       Pretending

ii)    Denial of Service

iii)  Manipulation

iv)  Win2000

 

2. Which out of the following is not a benefit of using a firewall?

i)       Access to host in the network can be strictly controlled.

ii)    Logging and statistics, use and misuse.

iii)  Security is concentrated on a single firewall system leading to better implementation of authentication procedures.

iv)  All of the above

 

3. The key fields which are tested by a Packet filtering firewall are:

i)       Source IP address

ii)    TCP/UDP Source port

iii)  Destination IP address

iv)  All of the above

 

4. Tick the odd item out:

             i)Stageful Inspection

             ii)Proxy firewall

             iii)Alta Vista

           iv)Packet-Filtering firewall

 

5. Choose the term not applicable for authentication methods:

i)       One time password system

ii)    Challenge/Response system

iii)  RADIUS

iv)  None of the above

 

6. Which of the following is related to internet security?

i)       MIT

ii)    Firewall

iii)  DSL

iv)  W3C

 

7. Which of the following is not a type of firewall?

i)       Packet-filtering firewall

ii)    Proxy firewall

iii)  Stageful Inspection

iv)  None of the above

 

8. What is SSL(Secure Socket Layer)?

i)       The IP Protocol to dynamically assign IP addresses.

ii)    It is a Web authoring tool

iii)  It allows secure connection

iv)  It is a scripting language

 

9. Networks are vulnerable to computer crime like:

i)Theft, Vandalism and graffiti

ii)Hacking, Viruses and software piracy

iii)Internet addiction, sabotage and negligence

iv)None of the above

10. A proxy server is used as the computer:

i)With external access

ii)Acting as a backup

iii)Performing file handling

iv)Accessing user permissions

 

State whether the following statements are True or False:-

 

1)    The pretence by a user to be a different user in order to gain access to information or to acquire additional privileges is a threat to Internet security.

2)    The replacement ,insertion ,deletion or disordering of user data during a communication by an unauthorized user does not form a part of Internet security.

3)    Protection from services, which are inherently more prone to attacks, is one of the benefits of using a firewall.

4)    The TCP/UDP ports are used by the application services like FTP, TELNET, HTTP, etc., to communicate on the network.

5)    The proxy service hides the internal host and service.

6)    Password is the method of authentication.

7)    Confidentially, integrity and availability are basic requirements of Internet security.

8)    In copyright, only expression is protected, not facts or ideas.

9)    Firewall is hardware or software designed to protect against network hackers.

   10)Firewalls cannot protect computer against viruses.

  11)The process of translating information from its original form into an encoded incomprehensible form is called encryption.

 

Match the following :-

 

1. Traffic analysis                  a. Firewall

2. Firewalls                           b. Application gateway

                                               and packet filtering

                                               firewalls.

3.Proxy server                        c. Advance authentication

                                                   Measures.

4.Robust security                     d. Internet security

                                                  Threats

5.Good firewall                      e. Prohibit anyone to

                                                 causing damages.

6.Free firewall                        f. Secret code

 

7.Encryption                          g. Zonal Alarm 2.0

 

8.Scrambling of a                               h. Key

 message for security.

 

9.To confirm the identity            i. Trojan Horse

 of a computer user.

 

10.A message from a trus            j. authentication

   -ted authority that is used

    during a secure transmission.

 

11.A string which is used to         k. Digital certificate

    encrypt data to keep it

    secure.

 

12.A security attack in which        l. Encryption

   someone inside a company

   is tricked into running a

   computer Program that

   sends information from

   the person’s computer

   to an outsider.

 

Fill in the blanks :-

 

a)    Firewall                        f) Authorization

b)    Hacker                                                       g) Auditing

c)     Source IP address                                    h) Callback

d)    Flexible                                                       i) Encryption

e)    Remote procedure call(RPC)                  j) Stageful Inspection

 

1. _______key field is tested in the packet filtering.

2. Packet filtering firewalls do not handle_______.

3. A good firewall system should be_______.

4. _______is one type of firewall.

5. _______is the process of test whether an authorized use is permitted to use resources or not.

6. _______is a security feature.

7. Collection and analysis of data is called_______.

8. _______is a computer enthusiast or expert who gains unauthorized access to computer systems for the purpose of stealing and corrupting data.

9. The process of translating information from its original form into an encoded, incomprehensible form is called_______.

10. _______stops unwanted traffic from entering the network.

 

 

Descriptive Type Questions:-

 

1.What do you mean by the term firewall? What are the different types of firewalls available for network protection? Describe any one.

2. Write short notes on the following:

  a. Benefits of using a firewall.

  b. Advantages of application gateway.

3. Define the terms authentication, authorization and accounting. What are the various methods of authentication? Describe each one of them.

4. What are the benefits of firewall?

5. What are the Internet security threats? What constitutes a good firewall system?

6. What is encryption? Explain the Public Key Encryption technique.

7. Describe in brief the actions (any five) that you will take to protect your PC that is networked against virus invasion.

8. Write short notes on proxy server and Internet security.

9. What is the difference between dynamic and static web sites?

10. What are the copyright issues? Explain.

11. What is asymmetric crypt o system?

12. Discuss the significance of private key and public key while encrypting a message with the help of examples.

 

No comments:

Post a Comment

MCQ QUESTIONS

Loading…