IS-I - Assignment 2022

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

RAJGAD INSTITUTE OF MANAGEMENT

RESEARCH & DEVELOPMENT, PUNE 43

A. Y. 2021-22

MBA First Year, First Semester


Comprehensive Concurrent Evaluation (CCE)
Assignments: 1 and 2

Name of the Student:


______________________________________________

Name of the Subject: Information Security – I

Roll No: ______________ Division: _______________


Rajgad Institute of Management Research & Development, Pune 43

INDEX

Assignment Assignment Date of Signature of the


No. Submission Student
1 Written Home
Assignment

----------------------------------------------------------------------------
To be filled by the Faculty
Comprehensive Concurrent Evaluation (CCE)

Assignment No. Evaluation Signature of the


(Marks) Faculty
Q.1 /14
Q.2 /06
Q.3 /05
Final Total Marks /25

Name & Signature of the Faculty: _____________________________

2|Page
Rajgad Institute of Management Research & Development, Pune 43

Assignment No. 1

Home Written Assignment (Total Marks 25)

Q. 1) Solve the following and choose the correct option. (14 Marks)

1) Which of the following is an advantage of anomaly detection?


a. Rules are easy to define.
b. Custom protocols can be easily analyzed.
c. The engine can scale as the rule set grows.
d. Malicious activity that falls within normal usage patterns is detected.

2) One of the most obvious places to put an IDS sensor is near the firewall. Where
exactly in relation to the firewall is the most productive placement?
a. Inside the firewall b. Outside the firewall c. Both

3) What is the purpose of a shadow honeypot?


a. To flag attacks against known vulnerabilities.
b. To help reduce false positives in a signature-based IDS.
c. To randomly check suspicious traffic identified by an anomaly detection system.
d. To enhance the accuracy of a traditional honeypot.

4) At which two traffic layers do most commercial IDSes generate signatures?


a. application layer b. network layer
c. session layer d. transport layer

5) When discussing IDS/IPS, what is a signature?

a. An electronic signature used to authenticate the identity of a user on the network


b. Attack-definition file
c. It refers to "normal," baseline network behavior
d. None of the above

6) IPSec is designed to provide the security at the


a. transport layer b. network layer
c. application layer d. session layer

3|Page
Rajgad Institute of Management Research & Development, Pune 43

7) In tunnel mode IPsec protects the


a. entire IP packet b. IP header
c. IP payload d. none of the mentioned

Q. 2) Discuss overview of firewalls and types of firewalls with (06 Marks)


the help of suitable diagrams.

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

4|Page
Rajgad Institute of Management Research & Development, Pune 43

Diagram:

5|Page
Rajgad Institute of Management Research & Development, Pune 43

Q. 3) Explain security in multimedia networks (05 Marks)

__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

6|Page

You might also like