Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
48Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Computer Security Sample Paper 5th Semester MSBTE Diploma in Computer Engineering Group

Computer Security Sample Paper 5th Semester MSBTE Diploma in Computer Engineering Group

Ratings: (0)|Views: 16,591|Likes:
Published by Sanjay Dudani
Computer Security Sample Paper 5th Semester MSBTE Diploma in Computer Engineering Group
Computer Security Sample Paper 5th Semester MSBTE Diploma in Computer Engineering Group

More info:

Published by: Sanjay Dudani on Nov 27, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

01/03/2013

pdf

text

original

 
Sample Question Paper
Course Name : Computer Engg. GroupCourse Code : CM/CO/IFSemester : FifthSubject : Computer SecurityMarks : 80 Time: 3 Hrs.Instructions:
1.
 
All questions are compulsory.2.
 
Illustrate your answers with neat sketches wherever necessary.3.
 
Figures to the right indicate full marks.4.
 
Assume suitable data if necessary.5.
 
Preferably, write the answers in sequential order.
Note:
Follow the sequence as per the question paper profile.
Q.1 Attempt any FOUR. 16 Marks
a.
 
List and Describe basic components of computer security.b.
 
List the step in verifying authencity and integrity of the digital certificate.c.
 
Describe the of denial of service attack with help of diagram.d.
 
What is IP security? Describe Authentication Header mode of IP security.e.
 
With the neat diagram describe network intrusion system mechanism.f.
 
What does encryption means? Describe shiif cipher encryption technique.
Q.2 Attempt any TWO. 12 Marks
a.
 
What is virus and Worms? Describe the virus spreading mechanism.b.
 
With respect to security policies, describe policies, standard, guideline and procedure.c.
 
Describe the handprint and Fingerprint mechanism for authentication of the user.
Q.3 Attempt any TWO. 12 Marks
a.
 
Describe what is code injections and how to prevent code injection.b.
 
Describe caeser’s cipher substitution technique of cryptographyc.
 
Describe buffer overflow and different status of the stack related to buffer overflow
9114

Activity (48)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
THIRUNEELAKANDAN liked this
Sujata Patil liked this
Sujata Patil liked this
Sujata Patil liked this
Farid Shaikh liked this
Anil Patle liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->