Biju Patnaik University of Technology Computer security model question papers



Download Model question papers & previous years question papers

Posted Date: 15 Jan 2011      Posted By:: Kartik     Member Level: Silver  Points: 5 (₹ 1)

2010 Biju Patnaik University of Technology M.C.A Computer security Question paper



Course: M.C.A   University/board: Biju Patnaik University of Technology





Fifth Semester Examination- 2010
COMPUTER SECURITY
Time:3 Hours
Max. Marks:70

Answer question No. 1 which is compulsory and any five from the rest.
The figures in the right-hand margin indicate marks.

1. Answer the following questions:- [2*10=20]

(a) Differentiate between threat and vunerability.

(b) During the transmission of a message, the message was modified by unauthorized people.Which security principle violated?

(c) What is the basic principle behind the Caesar cipher?

(d) How an exhaustive attack is carried out and what is the main idea of exhaustive attack?

(e) Define Trusted Computing Base(TCB).

(f) Give an example of inference problem.

(g) What are the benefits of sensitivity lock with respect to database security?

(h) List two major security advantages of optical fibre over other transmission media.

(i) What is a DoS attack ?

(j) What is link encryption ?

2. (a) What are the Shannons characteristics of a good cipher? [5]

(b) What are the advantages and limitations of stream and block cipher. [5]

3. (a) Briefly describe the AES algorithm. [5]

(b) Compare the AES algorithm with does algorithm. [5]

4. (a) With an example explain the concept of buffer overflow. Discuss how the buffer overflow has security implications. [5]

(b) What do you understand by targeted malicious code? What are the different types of targeted malicious code? [5]

5. (a) What are the major issues to be dealt with while designing a trusted operating system? [5]

(b) Give a comparative assessment of security features of ordinary operating system with the security features of trusted operating system. [5]

6. (a) What is a Digital Signature? What are the properties of a digital signature? How trust is maintained in the digital signature? [5]

(b) What are the basic security requirements of a database? [5]

7. (a) What major security persists in computer networks? How the attackers perpetrate their attack on networks? [5]

(b) What are the different active codes used by the websites. How they can compromise your security? [5]

8. (a) What is link encryption and how it differs from end to end encryption? Discuss. [5]

(b) List the major reasons as to why computer crime is hard to prosecute. [5]





Return to question paper search

Next Question Paper: C.s.e. zoology sample question paper for preliminary examination

Previous Question Paper: C.s.e. zoology sample question paper for preliminary examination

Related Question Papers:


  • Distributed systems


  • Object oriented analysis and design with uml


  • Internet technology and enterprise java


  • B.Tech/OPTIMIZATION IN ENGINEERING


  • B.Tech,PCCS4301/COMPUTER ORGANIZATION


  • Categories


    Submit Previous Years University Question Papers and make money from adsense revenue sharing program

    Are you preparing for a university examination? Download model question papers and practise before you write the exam.


    Looking for University or College admissions in India for 2021 - 2022 Academic Year?

    APPLY NOW
    Top Contributors
    TodayLast 7 Daysmore...

    Awards & Gifts

    Online Members

    Shriraam
    More...
     
    SpiderWorks Technologies Pvt Ltd, Kochi - India. © All Rights Reserved.