Indira Gandhi National Open University (IGNOU) Question Paper 2015
MASTER OF BUSINESS ADMINISTRATION
(MBACT)
Term-End Examination
June, 2015
MCTE-021 : NETWORK SECURITY
Time : 3 hours Maximum Marks : 100
Note : Attempt any five questions. All questions carry equal marks.
1. Define the terms Confidentiality, Integrity and Availability. Give three examples each of two
attacks that violate these goals. 20
2. What is the role of a firewall in securing a network ? Describe the different types of firewalls. 20
3. (a) Describe any five types of virus that can infect a system.
(b) Write a note on different authentication methods. 10+10
4. Discuss the various goals of information security. Also explain why the balance among different
goals is needed. 20
5. Distinguish between any two of the following : 10+10
(a) Public key and Private key
(b) Cryptography and Cryptanalysis
(c) Fingerprint and Retinal scan
6. Explain the following acronyms : 4x5=20
(a) LAN
(b) TCP
(c) SSID
(d) UTMS
7. Briefly comment on any two of the following : 10+10
(a) Clear guidelines for employees should be implemented for using the Internet
(b) When using a wireless connection, use a robust password
(c) Honeypots, essentially decoy network-accessible resources
8. Write short notes on any two of the following : 10+10
(a) Convert Channel
(b) E-mail Security
(c) RSA Algorithm
MASTER OF BUSINESS ADMINISTRATION
(MBACT)
Term-End Examination
June, 2015
MCTE-021 : NETWORK SECURITY
Time : 3 hours Maximum Marks : 100
Note : Attempt any five questions. All questions carry equal marks.
1. Define the terms Confidentiality, Integrity and Availability. Give three examples each of two
attacks that violate these goals. 20
2. What is the role of a firewall in securing a network ? Describe the different types of firewalls. 20
3. (a) Describe any five types of virus that can infect a system.
(b) Write a note on different authentication methods. 10+10
4. Discuss the various goals of information security. Also explain why the balance among different
goals is needed. 20
5. Distinguish between any two of the following : 10+10
(a) Public key and Private key
(b) Cryptography and Cryptanalysis
(c) Fingerprint and Retinal scan
6. Explain the following acronyms : 4x5=20
(a) LAN
(b) TCP
(c) SSID
(d) UTMS
7. Briefly comment on any two of the following : 10+10
(a) Clear guidelines for employees should be implemented for using the Internet
(b) When using a wireless connection, use a robust password
(c) Honeypots, essentially decoy network-accessible resources
8. Write short notes on any two of the following : 10+10
(a) Convert Channel
(b) E-mail Security
(c) RSA Algorithm
0 comments:
Pen down your valuable important comments below