Security In Computing (May – 2019) [Choice Based | Question Paper]



NOTES – 
(1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
(6) Use of Non – Programmable Calculator is allowed.

Q.1. Attempt Any Three Questions: (15 Marks)
(A) What are the importance of Information Protection? Explain with example.
(B) Explain about various components which are used to build a security program.
(C) What are the three recognized variants of Malicious Mobile code? Explain it.
(D) Write a short note on Network-Layer Attack.
(E) Explain the two most common approaches of Security.
(F) Explain the best practices for Network Defence.

Q.2. Attempt Any Three Questions: (15 Marks)
(A) Define Authentication. Explain two parts of Authentication.
(B) Explain the Authorization Systems.
(C) Briefly explain Public Key Cryptography.
(D) What are the three primary categories of Storage Infrastructure in Modern Storage Security?
(E) Write a short note on Integrity Risks.
(F) Explain Database-Level Security.

Q.3. Attempt Any Three Questions: (15 Marks)
(A) Explain the Cisco Hierarchical Internetworking Model.
(B) Briefly explain Network Availability and Security.
(C) Write a short note on Hubs and Switches.
(D) Explain the features of Firewall.
(E) Explain the five different types of Wireless Attacks.
(F) What are the Countermeasures against the possible abuse of Wireless LAN?

Q.4. Attempt Any Three Questions: (15 Marks)
(A) Explain Intrusion Defence System types and Detection Models.
(B) Write a short note on Security Information and Event Management.
(C) What are Voice over IP components? Explain it.
(D) Write a short note on Private Bank Exchange (PBX).
(E) Explain different Classic Security Model.
(F) Write a short note on Trust Worthy Computing.

Q.5. Attempt Any Three Questions: (15 Marks)
(A) Define Virtual Machine. How Hypervisor responsible for managing all guest OS installations on a VM Server.
(B) What is Cloud Computing? Explain the types of Cloud Services.
(C) Explain the Application Security Practices and Decisions that appear in most Secure Development Lifecycle.
(D) Explain the reasons for Remote Administration Security. What are advantages of Web Remote Administration?
(E) Explain the Security considerations for choosing a Secure Site Location.
(F) Explain the different factors for securing the assets with Physical Security Devices.

Question Paper

0 Comments