How To Exam?

a knowledge trading engine...


University of Mumbai 2007-2nd Year B.E Information Technology m University sem 8 2(year ) - Question Paper

Monday, 15 July 2013 07:15Web


This is the paper

#202 vwn> coobbi

i'T $*>- 'ZSl (*)    5e6fc[4/oN

*M(j a 006 (AiyiiBD cooflte)

eon 2S42<Ci<


fTDWMsrtrt ; <00


0

Ifi. fir Ortifai 11 fmptfrt*

(81 ammvt n *-*eo*i ovi < rm*Mn*.

Eapfui Vw eveiy coven liouitf ehaml cm t* imu&noed W i/i efejivakt'tc**" Swft dwutfl. f-* * I

U iheoerolsvw pNSWDAhWeo. EiiplaiaDevdopmenttiepd uhiunBtrttivc Cfifttrol ut 4oiil rj -1?0 Wcm the similarity *nd differences betweto signature bu erf IDS uui heuristic bosed IDS. What i/0 the luniusion* of IDS?

Um najor security threats dealt with tech Iwel of OS J protocol sirek.

Lill 1 (id explain variola iiailsUeal inference ucacKJ thftC in possible On dc abases.

Disci u ihe deign ofmelukvel Mure Hnwlmw Fapbm ii Retail (he steps ta risk analysis. rfee*vytotccfamqouofmemoryndidiWupmtcteon.fi. 10 What t Ih( Aiial ofttrvitt (DOS) lOick? VJ i$ lilt MUU/of 10 the tei *n 'StrvTCJT* i n DOS? Whit can possibly preve r>l DOS auielttf# 444 Compi *e copper wixe. microwave. optical fibre, infrared a*d rtdie * JO FreQuer*y wlfglc&Tmihcir Kiijiane* to passive afflictive ' wiretapping.

Lw the ..WtcttmVit* of a good fiiewtll impfcrcatfttioa wtm ait the limit iMu of futwalU?

fi) Cnf Mp)rrighr,p*mAdTra4eSeaaPitetUM.

(i) Diuif.jnisb VDO/ig Vt*Inerebfli<y, titfett vri eofflMl.

What ire iSe characteristics &f a god! security policy?

Pauy wcr<ers as programmer in a Corporation. David, her Sor*?vtew teMs her 10 write a rvogmm 1lnw    w>st

taoios din clly compwiy's account** files. Pauy know* abai idinarily | rogratas (Ii* af&ci the tccountiiig files involve svetJ tups, ad oj wtnch bav* 10 balance, Hay realiM Out wife ihe new program. It will be poiiible for one pero<m to outke chtnges to crucial amounts. and there will be ao way to (rare who made the* thtit&cs, wU    m siris    tase

<wcnts i-dvid, who tells her no) W be tooccrf*4> th< ber jobls

mp\f to wr -C Ihe poitvns as be spedfes. He nys <** t* ii ave of (he p tfntia] mitvte of The% prograAts, tout the justifies his fcqwesi by ftou ifl ihai periodically 1 flgupe is rnlstakenry entered In ihe euouAiini flies and the company needs 1 way to correct ihe inaccurate fipir This it an ciaaipk where a ptfMm is a&kcd w 40 Oaoduleac duA . Diteuu (he ethjeal issues involved ia (his cse.

19

Q. 1(1) ft) Q.:w ) j tW

<M'a

*>

QO

ft)

QiM

(W

Q.*W

Ch)


l\.


20

4$

as

10

10


PjckaJ-    oedtftvxp/

"    >vkAa

'    cIakJI oeci<

I,







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER University of Mumbai 2007-2nd Year B.E Information Technology m University sem 8 2(year ) - Question Paper