0% found this document useful (0 votes)
96 views

Mse24 Pyq

ignou mscis program previous year question paper

Uploaded by

shiv pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views

Mse24 Pyq

ignou mscis program previous year question paper

Uploaded by

shiv pandey
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

No.

of Printed Pages : 3 MSE-024

POST GRADUATE DIPLOMA IN


INFORMATION SECURITY

(PGDIS)
Term-End Examination
June, 2020
MSE-024 : POLICY, STANDARDS AND LAWS

Time : 3 Hours Maximum Marks : 70


Note : (1) Section 'A' : Answer all questions.

(ii) Section 93' : Answer all questions.

(iii)Section 'C' : Answer any three questions


out of four.

Section—A

1. Write short notes on the following : 3 each


' (a) Computer related offences
(b) Cyber squatting

P. T. 0.
[2] MSE-024

(c) Online dispute resolution


(d) Ranking of web pages
(e) Spam dexing
Section—B
Note : Answer all the questions.

2. What is Internet Protocol Service ? Explain its


electiveness and utilization in the Cyber Crime
Investigation. 5

3. What do you mean by Cyber Crimes ? Discuss


the nature and types of cyber crimes. What are
the challenges before it ? 5

4. What is meant by 'data," "document,"


"documentation", "logs" and "records" ? What
are the differences between them ? 5

5. Write the classification of Copyright


5
Applications.
6. What do you understand by Digital Signature ?
5
Section—C
Note : Answer any three questions out of four.

7. Explain' the stages for the development of •


10
International Standards.
[3 I

8. Explain three types of security policies (EISP,


ISSP and SYSSP) in detail. 10

9. What is risk management ? Why the


identification of risks by listing assets and
vulnerabilities is so important in the risk
management process ? 10

10. What types of attacks do users encounter


through social networking sites ? 10

MSE-024 1,040
No. of Printed Pages : 2 MSE-024

POST GRADUATE DIPLOMA IN


INFORMATION SECURITY (PGDIS)
Term-End Examination
December, 2020
MSE-024 : POLICY, STANDARDS AND LAWS
Time : 3 Hours Maximum Marks : 70

Note : (i) Section A— Answer both questions.


(ii) Section B— Answer all the questions.
(iii) Section C— Answer any three
questions out of four.

Section—A
1. Write short notes on any four of the following :
3×4=12
(a) Cyber Tort
(b) Encryption
(c) Cyber Terrorism
(d) Spam dexing
(e) Cryptanalysis
2. Explain the classification of Patent
Application. 3

Lot-I P. T. O.
[2]

Section—B

3. Describe the functions of Cyber Appellate


Tribunal. 5

4. Explain Digital Signature. 5

5. Describe the interaply between IPR and cyber


space. 5

6. Explain Web Crawling and Web Indexing. 5

7. What is hacking ? How does IT Amendment Act


help in tackling this crime of hacking ? 5
Section—C

8. What is time stamping and how does it work ?


Give its classification also. 10

9. Explain the types of attack. Do users encounter


through social networking sites ? 10

10. Describe the three types of security policies


(EISP, ISSP and SysSP). 10

11. Explain how does one deal with intellectual


property issues in cyber space in the current
environment of the law. 10
MSE–024
[2] MSE-024

Section—B
No. of Printed Pages : 3 MSE-024 Note : Answer all the questions.

2. What is web crawling and web indexing ? 5


POST GRADUATE DIPLOMA IN
INFORMATION SECURITY (PGDIS) 3. Explain the interplay between IPR and Cyber
Term-End Examination Space. 5
December, 2021
4. What do you understand by Digital
MSE-024 : POLICY, STANDARDS AND LAWS
Signature ? 5
Time : 3 Hours Maximum Marks : 70
5. What is Internet Protocol Services ? Explain its
Note : (i) Section A— Write notes on any five.
effectiveness and utilization in the cyber crime
(ii) Section B— Answer all the questions.
investigation. 5
(iii)Section C—Answer any three questions
6. Explain the role of government for regulating
out of four.
the internet censorship. 5
Section—A Section—C
1. Write short notes on any five of the following : Note : Answer any three questions out of four.
5×3=15
(a) Cyber stalking 7. What are the code of ethics to be adhered by the

(b) Software Piracy information security personal stipulated by

(c) Cryptanalysis different professional organization. 10

(d) Online dispute resolution 8. What is time stamp ? How does it work ?
(e) Cyber tort Elaborate on the classification of time
(f) Zones of trust stamping. 10

P. T. O.
[3]

9. Explain the role of cyber forensic in tackling


cyber crimes. 10

10. How does one deal with intellectual property


issues in cyber space in the current
environment of the law ? 10

MSE–024
No. of Printed Pages : 3 MSE-024

MASTER OF SCIENCE (INFORMATION


SECURITY) (MSCIS) / POST GRADUATE
DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
June, 2022

MSE-024 : POLICY, STANDARDS AND LAWS

Time : 3 hours Maximum Marks : 70

Note :
Section A – Answer all the questions.
Section B – Answer all the questions.
Section C – Answer any three questions out of four.

SECTION A
Answer all the questions.
1. Write short notes on any five of the
following : 53=15
(a) Key Establishment
(b) Data Alteration
(c) Cyber Terrorism
(d) Cyber Appellate Tribunal
(e) Spamdexing
(f) Cyber Squatting
MSE-024 1 P.T.O.
SECTION B
Answer all the questions.

2. Explain the efforts required for spreading


awareness and educating about cyber security. 5

3. Explain Online Dispute Resolution and its


methods. 5

4. Write a note on enforcement of Intellectual


Property. 5

5. Explain a cryptographic protocol and entity


authentication protocol. 5

6. Define hacking. How does IT Amendment Act


help in tackling this crime of hacking ? 5

MSE-024 2
SECTION C

Answer any three questions out of four.

7. Explain the procedure for the development of IT


Security Policy. 10

8. Explain the interface between Cyberspace


and IPR. 10

9. Explain time stamping and how it works. Also


give its classification. 10

10. What types of attacks do users encounter


through Social Networking sites ? Explain. 10

MSE-024 3 P.T.O.
No. of Printed Pages : 3 MSE-024

MASTER OF SCIENCE/POST
GRADUATE DIPLOMA IN
INFORMATION SECURITY

(MSCIS/PGDIS)
Term-End Examination
December, 2022
MSE-024 : POLICY, STANDARDS AND LAWS

Time : 3 Hours Maximum Marks : 70

Note : (i) Section ‘A’ : Answer all questions.

(ii) Section ‘B’ : Answer all questions.

(iii) Section ‘C’ : Answer any three questions


out of four.

Section—A

1. Write short notes on any four of the following :

3 each
(a) Data Diddling

P. T. O.
[2] MSE-024

(b) Cyber defamation

(c) Software piracy

(d) Liability of Internet Service Provider

(e) Digital Right Management

2. What is the function of Cyber Appellate


Tribunal ? 3

Section—B

Note : Answer all questions.

3. Discuss three types of Security policies. 5

4. Explain Information Warfare. 5

5. What do you understand by Cyber Squatting ? 5

6. Give the classification of Patent Application. 5

7. What is the difference between data, document,


documentation logs and records ? 5

Section—C

Note : Answer any three questions out of four.

8. Describe the stages for the development of the


International Standards in detail. 10
[3]

9. Explain about the right to privacy on the


Internet in detail. 10

10. ‘Cyber arbitration in India is the recognition of


the changing trend of dispute resolution.’
Explain in detail with the help of some case
studies. 10

11. ‘Standards make an enormous and positive


contribution to most aspects of our lives.’
Elaborate about the role of ISO Standards for
the protection of valuable information assets.

10

MSE–024
No. of Printed Pages : 3 MSE-024
MASTER OF SCIENCE INFORMATION
SECURITY/POST GRADUATE
DIPLOMA IN INFORMATION
SECURITY
(MSCIS/PGDIS)
Term-End Examination
June, 2023
MSE-024 : POLICY, STANDARDS AND LAWS
Time : 3 Hours Maximum Marks : 70

Note : (i) Section ‘A’ : Answer all questions.


(ii) Section ‘B’ : Answer all questions.
(iii) Section ‘C’ : Answer any three questions
out of four.

Section—A
1. Write short notes on any four of the following :
3 each
(a) Cryptanalysis
(b) Spamdexing
(c) Cyber Appellate Tribunal
(d) Key establishment
(e) Due Diligence

P. T. O.
[2] MSE-024

2. Write the main features of charter of Internet


Bill of Rights. 3

Section—B

Note : Answer all the questions.

3. Explain the copyright in Internet. 5

4. Do we need information security policy ?


Explain, why. 5

5. Explain the effectiveness and utilization of


Internet Protocol Services in the cyber crime
investigation. 5

6. What is the interplay between IPR and Cyber-


space ? 5

7. Explain the importance of time stamp. 5

Section—C

Note : Answer any three questions out of four.

8. How does one deal with intellectual property


issues in cyberspace in the current environment
of the law ? 10
[3]

9. As new and new opportunities and challenges


are surfacing, cyber law, being a constantly
evolving process, is suitably modifying itself to
fit the call of the time. Do you agree ? Explain
in detail. 10

10. What types of attack do users encounter


through social networking sites ? 10

11. Describe the process of developing company’s


security policy. 10

MSE–024

You might also like