How To Exam?

a knowledge trading engine...


Biju Patnaik University of Technology 2010 M.C.A Computer security - Question Paper

Friday, 24 May 2013 05:50Web

Fifth Semester Examination- 2010
COMPUTER SECURITY
Time:3 Hours
Max. Marks:70

ans ques. No. one which is compulsory and any 5 from the rest.
The figures in the right-hand margin indicate marks.

1. ans the subsequent questions:- [2*10=20]

(a) Differentiate ranging from threat and vunerability.

(b) During the transmission of a message, the message was replaced by unauthorized people.Which security principle violated?

(c) What is the basic principle behind the Caesar cipher?

(d) How an exhaustive attack is carried out and what is the main idea of exhaustive attack?

(e) describe Trusted Computing Base(TCB).

(f) provide an example of inference issue.

(g) elaborate the benefits of sensitivity lock with respect to database security?

(h) List 2 major security advantages of optical fibre over other transmission media.

(i) What is a DoS attack ?

(j) What is link encryption ?

2. (a) elaborate the Shannons characteristics of a good cipher? [5]

(b) elaborate the advantages and limitations of stream and block cipher. [5]

3. (a) Briefly define the AES algorithm. [5]

(b) Compare the AES algorithm with does algorithm. [5]

4. (a) With an example discuss the concept of buffer overflow. explain how the buffer overflow has security implications. [5]

(b) What do you understand by targeted malicious code? elaborate the various kinds of targeted malicious code? [5]

5. (a) elaborate the major problems to be dealt with while designing a trusted operating system? [5]

(b) provide a comparative assessment of security features of ordinary operating system with the security features of trusted operating system. [5]

6. (a) What is a Digital Signature? elaborate the properties of a digital signature? How trust is maintained in the digital signature? [5]

(b) elaborate the basic security requirements of a database? [5]

7. (a) What major security persists in computer networks? How the attackers perpetrate their attack on networks? [5]

(b) elaborate the various active codes used by the websites. How they can compromise your security? [5]

8. (a) What is link encryption and how it differs from end to end encryption? explain. [5]

(b) List the major reasons as to why computer crime is hard to prosecute. [5]



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Biju Patnaik University of Technology 2010 M.C.A Computer security - Question Paper