Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

No.

of Printed Pages : ,l

1320
CS/1T40061 Roll No:

Ⅳlay 2022

INFORMAT10N SECURITY
ffits{q,:rA lofumreio,eo
Timeallowbd:3Hoursl [MaxiElum Mrrks : 60

セ子 の 夕
召v″ ″ ζf■ 静ぎ′
筋″
:/1f73聯 'ra7カ
写 裁 蒻Fぉ 7a″
聯鶴′
:噺y″ ζ
静第鷲卵 ′
きぎ′

Par′ Cα ″たS
И関 ″ο″a″ ″οrο ttts 9r″ ′夕 `議ο 7VO 'レ saα
"gs″ “ "И

'ο

寧Ψ ttI為 霜 ,ぉ ″ さ■
ω ttη 洵
館 域 i幣
マ′

ωttj珍驚草孵 隧 蕉3お
肋 ω
I難

転 禦"″
悧 f∫競 協挽燻 撃
eti:鮮1乳 脚γ “
r1/ 節お 力蒻 きれ → 9く 輌″ぐ解 百 昴 載 ′

解 t躙 ξ解 │ ′ωηg″
"″
',ガ
ω ガ耐 解 鶴 И′
″ 2げ ′ ″κ″ 力′
′ ル ]確
gθ s
0″ ll E“ ルs″ ッ
arSわ "bο
"お '"C‐
+flq-c
-A
SECTION

ftrd s {ern 6 srrs{ nrdkE 6


qqRrd 3fr{ EiiT qiq 61--66a t I
1

(;; *l"i*", 1t1 srMffi+n


t+tlad
"' ,i+*
i"i -t.'^ 161 a+i
of an institutiol's cyber
svstematic and independent examination
securitY.
Li'".irtt "- tb) User Privileges

l:; ilil "nti"ution {d) \one of the above


PTO
(10f4)
CSrlT41MXl (2 ofo 1320
(D 争‐冬ヽqH螂 ミ
la)鍮 Чcゃ (b)れ
(C)● 口実 ヽ合補 可 セ ld)― 輛
Computcr Vinls is
(a)Hardwarc cOmpOncnt (b)Discasc
(C) Set Ofcomputcr hstruct10ns(d) A■ ofthe abovc

(ID― 事 争にH諭轟 さ奇事 可31Mj濤薦゛m漏 さq・ 14[口 101さ │

(al VLAN O) wLAN


(C)WAN O)MAN
is a custom network which is created from one or more local area
networks.
(al VLAN (b) WLAN
(C)WAN (d)MAN
(iV) IITTPS'ヽ ■ORl=
(a)Hン ト xt Transt,Protoc01 orrrP)¬ 町 Tmnspor Laytt S∝ 血
,cLS)ProtOCOl

(b) Hyp"cxt TransFer Prot∝ 01(HTrP)and IP protoc01
(c) 赫 輛

③ ゴ ゛調 ■■
HttPS is cOmbinatlon oF
(O Hy"“∝tTransFcrPmtOcOl α HP)and Tnnspon Lay衛 議 温 ″ lTLS)Protocol
(b) Hン pcrtext Transfcr ProtocOl(HTTP)and IP prOtOc01
(c) All ofthc abovc
(d) NOnc oFabovc

(V)赫 前
"GMqさ
(al SiCiゃ ヽЧ H (b) srar5lxqr+s{
●)o● 奇 m (d)sd司
C,ptography mcalls

(a) Data cOrruptiOn (b) Sccrct w■ ting OFData
(C) OVettnting oFdata (dl Rc■ Tlting OFData
(宙 ) ぃ い ゴれ さ゛帳 銅 奇要岸卿 Ч,qq。 調 ミ
"゛
l

(a) qBqrq (b) EFfiqq


(c) *#z (d) 6
is a process that traosforms encrypted information into its
original format.
(a) Encryprion G) Decryprion
(c) Sccrel (d) Key
-
CS′ IT40061 (3 oF4) 1320

(Vii) 司市 師 論 稀a in鍮 ¬゛ 諭 →

赫 疼 ヽn
●コ

ぶ節い`
■!ミ │

“ (b) う
て さ
(a)鋪
●)薇 (d)ヽ [“ ヽqlo
Thc function of a is to protcct thc computcr by flltcHng tramc a斑 b10cklng
Outsidcrs


(a) Bridgc Gateway


(C) POrt Firewall

(宙 )1頑 ■ 即 ミ
“ (a) gqqdfri-ssnclund (b) Ⅲ 豪細 耐

G) gcfu vqn 6{i srd cund (d) → さ調 轟


IPS is
(a) An lnWion Prevcntlon Systcm
(b) An intrusion PloCtlon Systcm
(c) An lnmsion Providing Systcm
(d)Nonc ofthc abovc
CX)響 ■13m前 "Ч・ 哺 式,マ ス専 漁い 詢 HHoさ
8は 1螢籠 M smd』 n鱗 i仇 chぉ mmonscc面 γ
面。
淵 ::::1 1:} l:8:::::
訥委暉
①繭
器』 赫淵ぷ 辮 瀾 麒
銀 η諏 赫
Kal燕価 Ⅲ (り
O wh、 市 赫 0ゴ さ訳 ■
is thc Act of thc lndian Parlimcnt notifled on 17 0ctobCr 20Klll lt iS thc
nlmCrcc (lxl。
再:311:│!llilingWithCilircilitti[il]liC°
l:こ 露
)

+f,i-*
SECTION _ B

2 qrn gwr +) ftr*rRa t d (3)


Defi ne lnformation Secuity.

3 qr{d{ c fiTrl *r
g{fi t
i qda ol t
13)
What is log in Cyber Security ? Describe'

4 qri.rri c{ 6TS{ gw +l cfu{rftd 6t I


(3)
f)efine weak security on Wi-Fi' PTO
CSllT41Xnl (4 oFo 1320
5 1Pscc→ │お H早 鳴、l ‐
Explam IPscc'劇
in bncF (3)

6… 莉 さ象 買 哺 Tl・ 輸 シ
Whatis cryptopphy and how does t wKlrk? 0)

7 nふ .“ 輌 ミ象 .ゴ さ?
Matis PKI a¨ d why is itimportant? (3)

8 温 び荀1lⅢ .3即 製[さ ?
What t IDS In nemOrk sccunty? 0)
9 誦角距 輛 ゃ1寒 含 JH鮒 [ョ 眠 ハ t?
Wtt do you mderstand by lntcllccml PrOpc● Law? (3)
れ n― 爺
SECr10N― C
10 鋼 魚 凛 ns荀 IR輛 祓 憫:む ヽイ 訳 領 潮 昴 雨 前 翻 訳 │

hat¨ thc sccurlty fcattres ofoperating sy¨ m?Descdbc ally four fcaturcs c)

H an■ /ar t0 3、 こゴ ■ t?ぐ H● 鳴、 1

Wtt TCP/1Pヽ l10t sccure?Exメ alo 0


12 赫 押 静れ哺 →誦 昴逸 う 。u“ oや uHョ :

Explaln asッ mmcalc kcy crypto"pけ "ヽ


Wlth thC help ofbl∝ k diagram 6)
13 帖 奇 ,:、 "、 奇 漱 さ。H..ヽ │マRttn… [ヽ 面 熙国 ヾ さ?
ExPlam public key lnfrastucture in detall Wし PubllC Key lnfrastucturc is"ぃ
imponnt? (81

14 tio=爾漱 ¬
「ミ象 買 論 o円 ヽ。 :ミ ?
hatis a VPN conccllntor and how dclesit work? 0

15 m載 :

W● te notc On:
(1)議 希 s.:`劇 K
NctwOrk securlty products
61)椰 dh aだ 。
台赫
Indian IT Act
(4+o

You might also like