Thursday, March 10, 2016

CS472 - Security in Computing - April May 2014

Anna University Questions - CS472 Security in Computing - April May 2014, Computer Science and Engineering (CSE), Seventh semester, regulation 2004





Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2014
Subject Code

CS472

Subject Name

Security in Computing

Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2004

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2014
Computer Science and Engineering
Seventh Semester
CS472 SECURITY IN COMPUTING
(Regulations 2004)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. State the advantages of Hill Cipher?
2. What is nonce and time stamp? List their roles in authentication.
3. What are non-malicious program errors?
4. Differentiate threats and virus.
5. What is assurance in trusted OS?
6. Differentiate between trusted and un-trusted operating system?
7. State the purpose of distributed intrusion detection system?
8. List the various threats in network security.
9. What are the benefits of Risk analysis?
10. What do you mean by software failure? Give an example

Part-B (5* 16 = 80 Marks)

11. A) i. With neat diagram, explain the Simple Data Encryption Standard and its features (8)
ii. Discuss about the symmetric and asymmetric encryption with an example (8)

12. A) i. Define access control list and capability and explain their relative strength and weaknesses. (8)
ii. Describe SSL protocol stack with suitable diagram (8)
(OR)
B) i. Explain the ways of preventing non-malicious program errors (8)
ii. Briefly explain how would you incorporate control against program threats? (8)

13. A) i. Describe authentication header mode of IP security with suitable sketch. (8)
ii. Distinguish among vulnerabilities, threats and control? (8)
(OR)
B) With neat diagram explain any two security models in trusted operating system (16)

14. A) i. Explain any two types firewall and its design issues (8)
ii. With suitable example, specify how you would secure e-mail (8)
(OR)
B) Elaborate your views in multilevel database and multilevel security is achieved (16)

15. A) Explain the purpose of an organization's security policy and what steps should be considered for its development. (16)
(OR)
B) Explain the following with an example
i. Computer Crime and its ethical issues (8)
ii. Risk Analysis in incorporating security (8)

************************













No comments:

Post a Comment

Featured Content

Multiple choice questions in Natural Language Processing Home

MCQ in Natural Language Processing, Quiz questions with answers in NLP, Top interview questions in NLP with answers Multiple Choice Que...

All time most popular contents

data recovery