Professional Documents
Culture Documents
UNIT IV
Sem.: EVEN
SYSTEM IMPLEMENTATION
Subject Code:
NE 7202
Branch
ME-CSE
Subject Name:
Year/Sem
I/ II
PART A
1. What is meant by Identity?
2. Define the principle of fail-safe defaults
3. What is principle of complete mediation?
4. Define the principle of Psychological Acceptability.
5. What is meant by Files and Objects?
6. What is meant by a Users, Groups, Roles and Frameworks?
7. How Naming and Certificates can de be achieved
8. What is Access control list?
9. What are the Capabilities of Access Control Lists?
10.What is lock and Key Technique?
11.What is Ring-Based Access Control?
12.What is meant by Propagated Access Control Lists?
13.What is meant by the term Identity on the Web?
14.How the Internet handles identity conflict?
15.Differentiate static and dynamic identifiers.
16.Define Confinement problem.
17.What is the use of sandboxes?
18.Define virtual machine
19.What is Capability list? Give an example
20.List the top ten OWASP Vulnerabilities
21.Define the information flow of an Assignment statement with example.
22.What is meant by Non lattice Information Flow Policies?
23.Define Compiler-Based Mechanisms and Execution-Based Mechanisms
24.What is meant by Isolation?
25.What is meant by Penetration Studies?
26.List the Classification of Vulnerability.
27.What is buffer overflow?
28.Define information flow of procedure calls
29.What is the use of covert channel?
30.Define the use of Fentons data Mark machine.
31.What is meant by incomplete mediation?
32.Define XSS.
33.What is meant by Anti Cross Site Scripting Libraries?
34.What is meant by Canonical Data Format? Give an example
35.Define Command Injection.
36.List some of the Application Controls
37.Define state and cookies.
PART B
1.
2.
3.
4.
5.
6.
7.
8.
Prepared by:
Verified by:
M.Azhagiri.
Asst.Prof./ CSE