Important Instructions To Examiners:: (Autonomous)
Important Instructions To Examiners:: (Autonomous)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Ans. The CIA triad is a model that guides information security by focusing on three Correct
key principles: confidentiality, integrity, and availability: Definiti
• Confidentiality: Limits access to data and information to authorized on 2M
individuals and systems
• Integrity: Ensures that information is accurate and trustworthy
• Availability: Guarantees that authorized people have reliable access to
information
Page 1 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Virus modifies the code. Worm does not modify the code.
Virus can infect other files. Worm does not infect other
files but it occupies memory
space by replication.
Virus may need a trigger for Worm does not need any trigger.
execution.
Ans. Cryptography is an ancient art and science of writing in secret message. In areas Correct
like data and telecommunications, cryptography is most important when Explanati
communicating over any un-trusted medium; it includes any network particularly on 2M
the Internet.
Cryptography, not only protects data from alteration, but it can also be used for
authentication of user.
OR
Cryptography is a technique of securing communication by converting plain text
into ciphertext.
It involves various algorithms and protocols to ensure data confidentiality,
integrity, authentication, and non-repudiation.
Page 2 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Passive attacks
1. Release of message contents
2. Traffic analysis
3. Eavesdropping
4. Password Sniffing,
5. Social Media Profiling
6. Shoulder Surfing
7. Covert Channel Attacks
8. Key logging
9. Network Mapping
10. Sniffing
2. Attempt any THREE of the following: 12M
Ans. The information classification defines what kind of information is stored on a 1M each
system. Based on that classification, the Information may need additional Criteria
protections in place. Explanati
on
Following are the criteria used to decide classification of information. 1. Value: It
is the common criteria of information classification. When the information is more
valuable for organization then that information should be classified.
2. Age: Age states that the classification of information might be lowered if the
information's value decreases over time. For example - if the documents are
classified and then they are automatically declassified after specific time period. 3.
Useful Life: Useful Life states that if the information has been made out-of-date
due to new information or any other reasons then that information can regularly be
declassified.
Page 3 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
• Dumpster diving isn't limited to searching through the trash for obvious
treasures like access codes or passwords written down on sticky notes.
Innocent information like a phone list, calendar, or organizational chart can
be used to assist an attacker to gain access to the network.
• To prevent dumpster divers from learning anything valuable from the trash,
experts recommend that the company establish a disposal policy where all
paper, including print-outs, is shredded in a cross-cut shredder before being
recycled, all storage media is erased, and all staff is educated about the
danger of untracked trash.
• Attackers always need a certain amount of information before attack. If the
attacker is in the surrounding area of the target, one common place to find
this information is to go through the target's trash in order to find little bits of
information that could be useful. This process of going through a target's
trash is known as dumpster diving.
• If the attackers are very lucky, and the target's security procedures are very
poor, they may actually find user IDs and passwords. We have studied earlier
that the users sometimes write their password down. When the password is
changed, they discard the paper where the old password was written on
without shredding it and in this way the lucky dumpster diver can get a
valuable clue.
• Even though the attacker is not lucky enough to obtain a password directly,
they can found the name of employee and from that it's not hard to determine
user IDs for attackers.
• From hardware or software manuals, which is purchased by user may also
provide clues as what vulnerabilities exist on the target's computer systems
and networks. Like this by many ways the attacker may gather a variety of
information, which can be useful in a social engineering attack.
Page 4 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Ans. Correct
Diagram
2M
&
Explanati
on 2M
Page 5 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 6 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
(ii) Hot fix: A hotfix is like a quick update that fixes a specific big problem in
software. It's not like regular updates which come on a schedule for small
improvements and bug fixes.
(iv) Service Pack: A service pack is a collection of updates and fixes, called
patches for an operating system or a software program. Many of these patches
are often released before a larger service pack, but the service pack allows for
an easy, single installation. An installed service pack also tends to update the
version number for Windows.
Page 7 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
2. Computer-generated passwords:
(i). Passwords are quite random in nature. Computer generated passwords
also have problems.
(ii). If the passwords are quite random in nature, users will not be able to
remember them. Even if the password is pronounceable, the user may have
difficulty remembering it and so be tempted to write it down.
(iii). In general, computer-generated password schemes have a history of
poor acceptance by users.
(iv). FIPS PUB 181 defines one of the best-designed automated password
generators. The standard includes not only a description of the approach but
also a complete listing of the C source code of the algorithm.
(v). The algorithm generates words by forming pronounceable syllables and
concatenating them to form a word. A random number generator produces a
random stream of characters used to construct the syllables and words.
Page 8 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
OR
2. Passphrase Selection
• Use a string of unrelated but memorable words or a phrase.
• This approach increases the length of the password while maintaining ease of
memorization.
• Example: HorseBatteryStapleCloud.
9. Mnemonic-Based Passwords
• Use a phrase or sentence to derive a password by taking the first letter of each
Page 9 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Limitations:
1. Weak Security: Caesar's cipher is vulnerable to brute force attacks since there
are only 25 possible shifts.
• Replace each letter in the plaintext with the letter shifted by the key.
Non-alphabetic characters remain unchanged.
Page 10 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
• Key: 3
Encryption Process:
1. Write the alphabet:
Alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Shifted: DEFGHIJKLMNOPQRSTUVWXYZABC
1. Replace each letter in the plaintext:
• H → K, E → H, L → O, L → O, O → R
• W → Z, O → R, R → U, L → O, D → G
Encrypted message: KHOOR ZRUOG
Decryption Process:
To decrypt, shift each letter backwards by 3:
• K → H, H → E, O → L, O → L, R → O
Page 11 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
• SMTP uses TCP port number 25 for his service. Hence, e-mail is delivered
from sender to receiver by having the source machine established a TCP
connection to port 25 of the destination machine.
1. At the sender's end, an SMTP server takes the message sent by a user's
computer.
2. At the sender's end, the SMTP server at the sender's then transfers the message
to the SMTP server of the receiver.
3. The receiver's computer then drags the email message from SMTP server at the
receiver's end, using other email protocols like Post Office Protocol (POP) or
Internet Mail Access Protocol (IMAP).
Page 12 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
2. Mail transfer:
After the connection has been established, the SMTP sender may send one or
more messages to the SMTP receiver.
3. Connection termination:
(a) The sender sends a QUIT command and waits for a reply.
(b) Sender initiates TCP close operation for the TCP connection.
(c) The receiver initiates its TCP close after sending is reply to the QUIT command.
Page 13 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
plaintext. plaintext.
Ans. DMZs (Dematerialized Zone) provide a level of network segmentation that helps 2M for
protect internal corporate networks. These subnetworks restrict remote access to Explanati
internal servers and resources, making it difficult for attackers to access the on &
internal network. This strategy is useful for both individual use and large 2M for
organizations. Businesses place applications and servers that are exposed to the Correct
internet in a DMZ, separating them from the internal network. The DMZ isolates diagram
these resources so, if they are compromised, the attack is unlikely to cause
exposure, damage or loss.
Page 14 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 15 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
Government.
• Mostly cyber crime is an attack on data or information about individual,
corporations or governments.
• Generally, the attacks do no take place on a physical body but it will be on
the personal or corporate virtual body that means a set of informational
attributes which define people and institutions etc. on the internet.
• In the digital world any person’s virtual identities are important elements
information’s about individuals can be used in multiple computer data
bases owned by governments and corporations.
• There are other crimes that involve attempts to disrupt the actual workings
of the internet.
o Financial
o Piracy
o Hacking
o Cyber-terrorism
o Online Pornography
o Sabotage
The abuse of computers has also given birth to a gamut of new age crimes
that are addressed by the Information Technology Act, 2000.
We can categorize Cybercrimes in two ways
• The computer as a Target: using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
• Computer as a weapon: using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc.
Cyber laws:
Page 16 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
• In India, the IT act,2000 as alter by the IT act, 2008 is known as cyber law.
It has a separate chapter entitled offences in which various Cyber Crimes
have been declared as penal offences punishable with imprisonment and
fine.
Cyber law includes laws relating to :
• Cyber Crimes
• Intellectual property
• Data protection and Privacy
• Electronic and Digital Signatures
The following are the details of cyber laws in India:
1. Section 65 – Tampering with computer Source Documents
2. Section 66 - Using password of another person
3. Section 66D - Cheating Using computer resource
4. Section 66E - Publishing private Images of Others
5. Section 66F - Acts of cyber-Terrorism
6. Section 67 - Publishing Child Porn or predating children online
7. Section 69 - Govt.’s Power to block websites
8. Section 43A - Data protection at corporate level
• Law may be formed in two ways: the first way is the legislative body and
the second way is to add new amendments by case laws. The case law is
defined as the law which is made by the current decisions of the cases
which has been taken by courts.
OR
(d) Write a brief note on Firewall configuration and state its limitations. 4M
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 18 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
Limitations:
1. Firewall cannot protect against attacks that bypass the firewall.
2. Firewall does not protect against insider threats like employees innocently
cooperates with an external attacker.
3. Firewall cannot protect against the transfer of virus infected programs or files.
4 It may not be able to protect against viruses and infected files since it may not
be possible to scan all incoming traffic.
OR
Firewall Configuration:
Firewall configuration involves setting up rules and policies to control network
traffic to protect systems from unauthorized access and cyber threats. A firewall
acts as a barrier between trusted internal networks and untrusted external
networks, like the internet. Configuration typically includes:
1. Defining Access Rules: Specifying which traffic is allowed or blocked based
on IP addresses, ports, and protocols.
2. Network Address Translation (NAT): Mapping private IP addresses to public
ones for secure communication.
3. Intrusion Prevention: Monitoring and blocking malicious traffic patterns. 4.
Setting Up Zones: Segregating networks into zones (e.g., internal, DMZ,
external) with specific access rules.
5. Logging and Monitoring: Enabling logs for auditing and troubleshooting
network traffic.
Limitations of Firewall:
1. Cannot Prevent Internal Threats: Firewalls are ineffective against threats
originating within the network.
2. Limited Protection for Encrypted Traffic: Cannot inspect encrypted data
Page 19 of 37
TECHNICAL EDUCATION (Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans. 2M for
Correct
diagram
&
2M for
Explanati
on
Key Characteristics:
Page 21 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 22 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Applications:
Advantages:
(ii) Steganography:
Page 23 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
For example:
▪ In
images, the least significant bit (LSB) of pixel values is altered to
encode data.
▪ In audio, minor changes to frequencies or amplitude are used.
2. Extraction: The recipient uses a predefined key or algorithm to extract
the hidden information.
Applications:
Advantages:
Page 24 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Key Features:
1. Time-based Tickets: Ensures tickets are valid only for a specific time period,
reducing misuse.
2. Mutual Authentication: Both client and server confirm each other’s identity 3.
Single Sign-On (SSO): Users authenticate once and gain access to multiple
services.
4. Symmetric Cryptography: Kerberos primarily uses symmetric encryption
(e.g., AES or DES) for encrypting tickets and session keys.
5. Mutual Authentication: Both the client and the server verify each other’s
identity, reducing the risk of man-in-the-middle attacks.
6. Replay Attack Protection: Kerberos includes timestamps in its tickets,
ensuring that old or duplicated tickets cannot be reused.
7. Single Sign-On (SSO): Users authenticate once and can access multiple
services within the network without re-entering credentials.
Page 25 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
Page 26 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
▪ Optical:
Uses light to capture the ridge patterns.
▪ Capacitive: Measures electrical differences in ridge and valley patterns.
▪ Ultrasonic: Uses sound waves to map the fingerprint structure.
2. Feature Extraction: Algorithms extract specific features like:
▪ Minutiae Points: Ridge endings and bifurcations (branching points).
▪ Core and Delta Points: Central points and triangular patterns.
▪ Ridge counts and flow patterns.
3. Template Creation: The extracted features are stored as a
mathematical representation (not as an actual image) to ensure privacy.
4. Matching: The template is compared to stored fingerprint templates in
the database during verification or identification.
Applications:
Retina scanning is a biometric technique that uses the unique patterns of blood
vessels in the retina (a thin layer of tissue at the back of the eye) to identify or
verify a person's identity. The retina's intricate vascular patterns are unique to
each individual, even between identical twins, and remain stable over time,
making this method highly accurate and secure.
Page 27 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 28 of 37
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_________
Winter-2024 EXAMINATION
Model Answer – Only for the Use of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 29 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
How it Works:
Advantages:
1. Simple to implement and configure.
2. Efficient for networks with basic traffic control needs.
3. Can prevent unauthorized access based on IP addresses or port numbers.
Disadvantages:
1. Lacks the ability to inspect deeper packet contents (e.g., payload). 2.
Cannot detect malicious traffic hidden in allowed protocols (e.g., HTTP or
HTTPS).
3. Does not track connection states, leading to potential security gaps.
Example Use Case: A packet filter firewall might block incoming packets
from specific IP addresses (e.g., known malicious sources) or disallow access
to certain ports (e.g., 22 for SSH) to restrict unauthorized access to a server.
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Key Features:
How it Works:
1. Forward Proxy: The most common type, used by clients (e.g., users) to access
Page 31 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
Advantages:
1. Privacy and Anonymity: By hiding the client’s IP address, proxies
provide anonymity for users.
Disadvantages:
1. Single Point of Failure: If the proxy server goes down, clients may be
unable to access the resources they need.
2. Slower Performance: In some cases, proxy servers can slow down traffic
due to their intermediary role, especially if they are overloaded.
3. Limited Security: While proxies provide some security features, they are not
a substitute for other security measures like firewalls and intrusion detection
systems.
Page 32 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Page 33 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
Q. Sub Answer Marking
N Q. Scheme
o. N.
(ii) Patent:
1. Exclusive Rights: The patent holder has the exclusive right to use, make, sell,
or license the invention.
2. Invention: The patent is granted for new inventions or improvements to
existing inventions.
3. Novelty: To qualify for a patent, the invention must be novel, meaning it must
be new and not previously disclosed to the public in any form (e.g., published in
scientific papers, patents, or existing products).
4. Non-Obviousness: The invention must not be obvious to someone skilled in
the relevant field based on existing knowledge or inventions.
5. Utility: The invention must be useful and capable of providing some practical
benefit.
Page 34 of 37
TECHNICAL EDUCATION (Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Types of Patents:
1. Utility Patents: These are the most common type and cover new inventions or
functional improvements to existing products or processes. Examples include
machines, tools, software algorithms, or chemical compounds.
2. Design Patents: These protect the aesthetic design of an article or product,
such as the unique visual appearance of a chair or a smartphone. They do not
cover the functionality of the item.
3. Plant Patents: These are granted for new, distinct, and asexually reproduced
varieties of plants (e.g., new strains of flowers or crops).
(iii)Trademark:
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
consumer trust.
Types of Trademarks:
Page 36 of 37
(ISO/IEC - 27001 - 2013 Certified)
Winter-2024 EXAMINATION
_________ Model Answer – Only for the Use
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION (Autonomous)
of RAC Assessors
Subject Name:
Subject Code: Network an Information Security 22620
4. Enforcement: The trademark holder has the right to enforce the trademark by
taking legal action against others who use a confusingly similar mark in a way
that could cause consumer confusion or dilution of the trademark's value.
Page 37 of 37