Anna University Questions - CS472 Security in Computing - April May 2014, Computer Science and Engineering (CSE), Seventh semester, regulation 2004
Exam
|
B.E/B.Tech. (Full
Time) DEGREE END SEMESTER EXAMINATIONS
|
Academic
Year
|
April May 2014
|
Subject
Code
|
CS472 |
Subject
Name
|
Security in Computing |
Branch
|
Computer Science and Engineering
|
Semester
|
Seventh Semester
|
Regulation
|
2004
|
B.E
/ B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science
and Engineering
Seventh Semester
CS472
SECURITY IN COMPUTING
(Regulations 2004)
Time : 3 Hours Answer A L L Questions Max. Marks 100
PART-A
(10 x 2 = 20 Marks)
1. State the advantages of Hill
Cipher?
2. What is nonce and time stamp? List
their roles in authentication.
3. What are non-malicious program
errors?
4. Differentiate threats and virus.
5. What is assurance in trusted OS?
6. Differentiate between trusted and
un-trusted operating system?
7. State the purpose of distributed
intrusion detection system?
8. List the various threats in network
security.
9. What are the benefits of Risk
analysis?
10. What do you mean by software failure?
Give an example
Part-B
(5* 16 = 80 Marks)
11. A) i. With neat diagram, explain
the Simple Data Encryption Standard and its features (8)
ii. Discuss about the symmetric and
asymmetric encryption with an example (8)
12. A) i. Define access control list
and capability and explain their relative strength and weaknesses. (8)
ii. Describe SSL protocol stack with
suitable diagram (8)
(OR)
B) i. Explain the ways of preventing
non-malicious program errors (8)
ii. Briefly explain how would you
incorporate control against program threats? (8)
13. A) i. Describe authentication
header mode of IP security with suitable sketch. (8)
ii. Distinguish among vulnerabilities,
threats and control? (8)
(OR)
B) With neat diagram explain any two
security models in trusted operating system (16)
14. A) i. Explain any two types
firewall and its design issues (8)
ii. With suitable example, specify how
you would secure e-mail (8)
(OR)
B) Elaborate your views in multilevel
database and multilevel security is achieved (16)
15. A) Explain the purpose of an
organization's security policy and what steps should be considered for its
development. (16)
(OR)
B) Explain the following with an
example
i. Computer Crime and its ethical
issues (8)
ii. Risk Analysis in incorporating
security (8)
************************
Go
back to Anna University B.E Computer Science and Engineering Regulation 2004 and 2008 Seventh Semester Questions page
Go back to Anna University B.E Computer Science and Engineering Questions April May 2014 page
No comments:
Post a Comment