nilet model paper a

Upload: jitendradausa

Post on 04-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 NILET Model Paper A

    1/4

    DOEACC Society

    CERTIFICATION SCHEME IN INFORMATION SECURITY (LEVEL-1)

    CERTIFIED SYSTEM SECURITY ANALYST (CSSA)December 2010 Examination

    Model Question paper 1

    Note1. There are two parts in this paper.2. PART ONE is objective and PART TWO is descriptive type.

    TOTAL TIME: 3Hours MAXIMUM MARKS: 100

    (PART ONE-50; PART TWO-50)PART-ONE (OBJECTIVE TYPE)

    Answer al l Quest ions in part one

    Q.1 Fill in the Blanks (1 mark x 10 ) 1) _________________ means a person who is intended by the originator to receive the electronic

    record but does not includes any intermediary.2) __________________ means a person who has been granted a license to issue a digital

    signature under section 24 of the I.T. Act.3) __________________ means an algorithm mapping or transformation of one sequence of bits

    into another.4) The control government shall by notification, establish one or more appellate tribunal to be

    known as the__________________________.5) According to the national research councils computers at RISK, published in 1991, the threesecurity related need are___________________________.

    6) Risk management involves assessing IT resources in terms of potential threats & _______.7) A_____________________ is some one who hack code.8) ___________is the term that truly defines the mischievous & some time destructive person.9) ______________________firewall works at the packet level.10) _______________________servers allow indirect internet access through the firewall.

    Q.2 State True or False, Write Correct answer (T/F) in Bracket [ ] only (1 mark x 10 )1) Exercising supervision over the activities of the certifying authorities is a function of controller.

    [ ]

    2) There is no penalty as per the IT ACT 2000 to person who disrupts or causes disruption of anycomputer, computer system or computer network. [ ]3) Indian evidence ACT 1872 is amended due to the IT ACT 2000. [ ]4) RSA is one of the cryptography algorithms. [ ]5) The program level policy should establish individual Employee accountability. [ ]6) Proxy Server does not always allow internet sharing in an intranet. [ ]7) IP or filtering firewalls can block all but selected network traffic. [ ]8) The Passwd file can be created with a utility called htpasswd. [ ]9) The NCSA servers can be configured for password authentication on a directory basis only.

    [ ]10) The general feeling in the security community is that the larger the program, the less likely to

    leave bugs [ ]Q.3 Match the followings with best possible matches. Write the matching Sr. No of column A inbracket [ ] of column B only:

    (1 markX10)

  • 8/13/2019 NILET Model Paper A

    2/4

    Column A Column Ba) IP Address [ ] the number of octet received at networkb) Counter [ ] Net watcherc) SNMP [ ] Protocol Analyzerd) Baud Rate [ ] Expressed as four octete) Network Monitoring Device [ ] Network Management Protocolf) Microsoft tool for network [ ] Network Security Monitoringg) Firewall [ ] ASN 1i) Router [ ] Modem speed

    j) RMON [ ] Remote Monitoring Toolk) SNMP Data type [ ] WAN

    Q.4 Multiple Choice Questions; Tick the best answer ( 1 mark x 10 )

    1. Components of program level policya) Purpose b) Scopec) Goal d) All of above

    2. Which of the following might be an SNMP network agent?a) Workstation b) routerc) Hub d) all of the abovee) Only b and c

    3. A SNMP network agent gathers information to store ina) Buffers b) a Management Information Base(MIB)c) a cache d) an SQL Server database defined by the network manager

    4. You want to determine the number of broadcasts from networked servers and workstations on aMicrosoft-based network. Which of the following tools would give that information?a) Microsoft Network Monitor b) Cable scanner

    c) Time domain reflectometer d) all of the abovee) Only a and c

    5. What software is necessary to enable a Microsoft NT Workstation to gather data about TCP/IPtraffic on a network?a) Performance Monitor b) SNMP servicec) IPX Agent d) SNMP Monitor

    6. You manage three networks in three neighboring cities and want to monitor performance on allthree networks from one location. Which of the following would you use?a) Intranet monitorb) Net Watcher

    c) Common Management Interface Protocol (CMIP)d)Remote Networking Monitoring(RMON)

    7. Ethereal is aa) Firewall b) Protocol Analyzerc) Sniffer d) Anti virus

    8. Once installed Network Monitor Agent enables network data to be gathered:a) Through a NICb) Through the Session layer of the OSI modelc) By sending repeated tracer signals throughout the network.d) Through a customized network cable attachment interface

    9. Bastille is aa) Sniffer b) Firewallc) Protocol d) Hardening tool

  • 8/13/2019 NILET Model Paper A

    3/4

    10. The performance monitor runs from which of the following:a) Windows NT Workstation b) Windows NT Serverc) Windows 95 d) All of the abovee) Only a and b

    Q.5 Multiple Choice Questions; Tick the best answer ( 1 mark x 10 )

    1. A workstation in a ______________domain can access servers and printers in a differentdomain.a) Trusted b) trustingc) Reciprocal d) reciprocating

    2. Which of following is not an NT Server administrative wizard?a) Add Printer b) Install New Modemc) License Compliance d) Network Protocol Configuration

    3. Filters are used to helpa) Install software b) set up initialization files.c) Capture network events d) build GUI representations of networks

    4. Internet Information Server can limit access to a Web site bya)IP address b) subnet maskc) Workstation location d) all of the abovee) only a and b

    5. Which tool would you use to remotely run a users workstation to diagnose a problem?a) Network Monitor b) System Management Serverc) Client Administration Wizard d) User Manager for Domains

    6 Microsoft domain management

    a) Always centralizes network managementb) Enables centralized or decentralized network managementc) Always decentralizes network managementd) Does not affect network management techniques

    7. Which network tool can inventory how many workstations have word processing software?a) Network Monitor b) System Management Serverc) Event Viewer d) protocol analyzer

    8. What tool would you use to add a new NT server to an existing Microsoft Domain?a)Open View b) User Manager for Domainsc) Server Manager d) Domain Wizard

    9. Where might you find out if a server is running low on disk space?a) Network Monitor b) Event Viewerc) Server Manager d) all of the abovee) Only a and b

    10 Microsofts remote administration can be run froma)MS-DOS b) Windows for Workgroupsc) Windows NT d) all of the abovee)only b and c

    PART-II: SUBJECTIVE TYPE

    Q6 Answer the follow ing: (3+3+4 marks)a) In IT Act 2000, what are the major offenses defined and penalty clause?b) What are three key properties of hash function?c) What is certificate? Briefly explain X.509 standard for certificates?

  • 8/13/2019 NILET Model Paper A

    4/4

    Q7. Answer the fol lowing: (3+3+4 marks )

    a) What are the essential components of a corporate security policy?b) Distinguish between a Trojan and a worm?c) Describe briefly about choosing good password & how system can help to improve?

    Q8 Answer the follow ing: (5 marks x 2)a) What are the various steps in generating digital signature?b) What are the advantages or disadvantages of symmetric & asymmetric cryptography?

    Q9 Answer the follow ing (5 marks x 2)a) What are the different biometric techniques for authentication? Explain what false accept

    and false reject terms are for an authentication?b) A company has a security policy that says only employees who are Manager are

    permitted to send e-mails through the internet. All employees can send the e-mails withincompany. What type of firewalls could you use to enforce this policy?

    Q10 Answer the follow ing (5 marks x 2)a) Describe briefly the Bell-La padula model & its limitations?b) What are the four stages of typical virus?