How To Exam?

a knowledge trading engine...


B.E-B.E Computer Science SECURITY IN COMPUTING (Karunya University, Coimbatore-2012)

Saturday, 24 August 2013 01:11anudouglas
Reg. No. ________                                                                                                                                                   

Karunya University

(Karunya Institute of Technology and Sciences)

(Declared as Deemed to be University under Sec.3 of the UGC Act, 1956)

 

End Semester Examination – November/ December - 2012

 

Subject Title: SECURITY IN COMPUTING                                                                                    Time: 3 hours

Subject Code:            09CS306                                                                                                          Maximum Marks: 100          

                                                                                                                                                                                                                                              

Answer ALL questions (5 x 20 = 100 Marks)

 

1.         Discuss in detail about the different viruses, their effects and causes.

(OR)

2.         a.         Explain about Trapdoors and Salami attack with examples.                                                              (12)

            b.         What is a Root kit? Explain XCP and privilege escalation.                                                                           (8)       

 

3.         a.         Discuss the security methods of Operating systems.                                                                                      (8)

            b.         What is Paging?                                                                                                                                                                                              (6)

            c.         Explain about tagged architecture.                                                                                                                                         (6)

(OR)

4.         a.         What is a Brute force attack? Give the password guessing steps.                                                     (6)

            b.         Explain password selection criteria.                                                                                                                                        (8)

            c.         Discuss the problems with biometrics.                                                                                                                                    (6)

 

5.         a.         Explain the various Security requirements.                                                                                                                (10)

            b.         What is two-phase update? Explain in detail.                                                                                                                        (10)

(OR)

6.         a.         What is Polyinstantiation? Give the characteristics of database security emerge.                 (5)

            b.         Explain the proposals for multi-level security.                                                                                                            (15)

 

7.         a.         How does a network differ from a stand-alone environment?                                                                       (8)

            b.         Compare link and end-to-end encryption.                                                                                                                  (6)

            c.         What is PKI? Give the issues related to it.                                                                                                                 (6)

(OR)

8.         a.         Expand and explain about IDS.                                                                                                                                             (12)     

            b.         Explain PGP and S/MIME.                                                                                                                                                    (8)

 

9.         Compulsory:

 

            a.         Explain the contents of Security plan.                                                                                                                       (14)

            b.         What are the characteristics of a good security policy? Explain in detail.                             (6)       


( 0 Votes )

Add comment


Security code
Refresh

Earning:  ₹ 5.10/-
You are here: PAPER B.E-B.E Computer Science SECURITY IN COMPUTING (Karunya University, Coimbatore-2012)