can't find your donut ?? lets search

for msbte curriculams first please see this page carefully http://www.msbte.com/website/curriculum/

IMPORTANT

If you are MSBTE diploma third year student of computer branch co,cm,if,cd plesae subscribe to my blog by email.. by link given below

computer security 20 marks and 80 mark MSBTE third year fifth semester co,cm,cd,if CO/cd/cm/if SAMPLE question paper CS ,

Sample Test Paper-I
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20
Time: 1 Hrs

Q.1 Attempt any TWO.---------08 Marks
a. State and Describe Security goals.
b. Describe piggy backing and Shoulder Surfing
c. Describe cryptography and cipher text

Q.2 Attempt any THREE.---------12 Marks
a. “I am Third Computer Engineering student studying in 6th semester” convert it
into cipher text using double transposition method.
b. What is digital Certificate and how it can be used for authentication?
c. What is Access control? List the method of access control and describe the one
which is mostly used now days
d. What attack? List different type of attack? Describe the attack which includes
zombies as agent of attack.





Sample Test Paper-II
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 20

Q.1 Attempt any TWO.-------08 Marks
a. What is Firewall? List Different type of fire wall.
b. What is intruder? Describe Intruder Detection System.
c. Describe Virtual Private network.

Q2. Attempt any THREE.--------12 Marks
a. List Different Email Protocols and describe any one in detail.
b. Draw SSL architecture and Describe How to secure Socket Layer.
c. Describe Hierarchical Trust Model.
d. What is Hardening and describe it related to Unix / Linux system.



Sample Question Paper
Course Name : Computer Engg. Group
Course Code : CM/CO/IF
Semester: Fifth
Subject: Computer Security
Marks: 80
Time: 3 Hrs.

Q.1 Attempt any FOUR. --------16 Marks

a. List and Describe basic components of computer security.
b. List the step in verifying authencity and integrity of the digital certificate.
c. Describe the of denial of service attack with help of diagram.
d. What is IP security? Describe Authentication Header mode of IP security.
e. With the neat diagram describe network intrusion system mechanism.
f. What does encryption means? Describe shiif cipher encryption technique.

Q.2 Attempt any TWO.---------12 Marks
a. What is virus and Worms? Describe the virus spreading mechanism.
b. With respect to security policies, describe policies, standard, guideline and procedure.
c. Describe the handprint and Fingerprint mechanism for authentication of the user.

Q.3 Attempt any TWO.----12 Marks
a. Describe what is code injections and how to prevent code injection.
b. Describe caeser’s cipher substitution technique of cryptography
c. Describe buffer overflow and different status of the stack related to buffer overflow

Q.4 Attempt any TWO.--------16 Marks
a. What is operating system security? Compare the security system of windows and Linux
operating system.
b. Describe single homed bastion and screened host gateway type of firewall
c. Describe the component of Host Based IDS? State its advantage and disadvantages.

Q.5 Attempt any THREE.-----------12 Marks
a. Describe Threat, Vulnerability and attack as characteristics of Computer Intrusion.
b. List the method of defense? Describe controls, Encryption related to defense methods.
c. Describe MD2, MD4, MD5 hashing functions.
d. Describe the requirement and solution to email security.

Q.6 Attempt any THREE.----------12 Marks
a. What is Hash Function? Describe with example.
b. Describe the handwriting and signature process of verification.
c. Explain symmetric and asymmetric key cryptography.
d. List and describe different ways of web security.

0 comments:

Post a Comment



 

ana