How To Exam?

a knowledge trading engine...


SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper

Thursday, 31 January 2013 12:05Web

DEPARTMENT OF COMPUTER SCIENCE
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
(DEEMED UNIVERSITY)

CS-356 NETWORK SECURITY
(ELECTIVE for B.Tech CSE - VI SEM)

UNIT I
PART A

1. List and briefly describe 3 classes of intruders.
2. elaborate the 2 common techniques used to protect a password file?
3. elaborate the 3 benefits that can be given by an intrusion detection system?
4. What is the difference ranging from statistical anomaly detection and rule based
intrusion detection?
5. What metrics are useful for profile based intrusion detection?
6. What is the difference ranging from rule based anomaly detection and rule based penetration identification?
7. What is a honey pot?
8. What is a salt in the situation of UNIX password management?
9. List and briefly describe the 4 techniques used to avoid guessable passwords.
10. What is the role of compression in the operation of a virus?
11. elaborate typical phases of operation of a virus or worm?
12. How does a worm propagate?
13. What is a digital immune system?
14. What is meant by trap door?
15. discuss logic bombs.
16. explain Trojan horses.
17. describe virus.
18. What is a worm?
19. What does zombie mean?
20. List the various kinds of viruses.
21. Differentiate virus and worms in cryptographic system.
22. What is macro virus?
23. elaborate the design goals of firewall?
24. List the 4 general techniques that firewalls use to control access and enforce the site's security policy.
25. elaborate the limitations of firewalls?
26. elaborate the kinds of a firewall?
27. What do you mean by IP address spoofing?
28. What is a source routing attack?
29. explain about Tiny fragment attacks.
30. What is Bastion host? Write its characteristics also.
31. elaborate the important firewall configurations?
32. Write the basic elements of a general model of access control.
33. elaborate the advantages of screened subnet firewall configuration?
34. List the properties of the reference monitor.
35. What info does a typical packet - filtering router use?

PART B

1. discuss the intrusion detection approaches.
2. discuss the different intrusion techniques in detail.
3. With necessary sketch discuss various kinds of firewalls.
4. discuss in detail about the following:
i) firewall characteristics
ii) firewall configuration
iii) firewall capabilities



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper