You are on page 1of 8
‘Non-programmable Draw, wherever necessary. - ~ ©) Use of calculators is allowed sj 1 Answer any two of the following: . - What are the various risk framing components & explain relationship among them? ~ Explain generic risk model in detail. Explain in brief the COBIT ARCHITECTURE. Explain OCTAVE with its key characteristics and criteria. } Answer any fvo of the following: - Explain the types of IDPS technologies “Explain the different firewall technologies and policies. ‘What is token? Explain its different types along with pros and cons. Write a short note on Server Security Principles Answer any two of the following: 12 ist the most commonly logged types of information and their potential benefits. Wnite a short note on Patch and Vulnerabilty Group.Qr4o beur NUL panentolly _ Elaborate briefly on the need for Log management. \W\C2ses4 “sy Wee COCOA poly Write a short note on PKI components & Pe PALSY +h vena daikon Answer any nwo of the following: Pineal 12 Explain the various backup & recovery techniques for applications. é ne Explain the main principles of inf security audit pare List and explain the phases of a disaster recovery plan Explain Audit Trails. What are the two types of audit records explain in detail?’ nol \ Auswer any two of the following: p. What is the NMAP? Explain the uses of NMAP. Explain the basic scan type in @<* > NMAP, How is the collection of files done in forensic science? ‘What is NESSUS? Why is it considered as the most popular vulnerability scanner? What does ISO 17799 consist of? Explain briefly its protection classes and the process the organization should use to implement this standard. MS (T) papell Elective + (REVISED COURSE) — QP Code : 17912 2% hrs) «S) Draw Seat labeled diagrams wherever necessary, (©) Use of Non-programmable calculators is allowed QU Answer awv peo of the following: 2 & Explain virtualization, virtual machine and virwal machine monitor. & -Whatare process virtual mac & fi n? Explain storage virtualization. a f Virtualization? Q2. Answer ay fwo of the following: 2 LX _« Explain Hardware partitioning & Gi fe us é a How help in disast Answer any two of the following: n 4 Explain ere en virtual devices Q4 Answer any mo of the following 12 Compare FCIP and ‘ ‘CIP and (FCP Explain the IS Answer any two of the fo Discuss the different them technologies Discuss the memo ing. 2 nn a a (REVISED COURSE) QP Code: 17992 (Q% Hours) ‘ Max Marks: 60 . (1) All questions are compulsory, Q) Make suituble assumptions wherever necessary and state the assumptions made. @) Answers to the same question must be er. (4) Numbers to the right indicate marks. diagrams wherever necessary. (9) Draw © Use of Non-programmable calculators is allowed Auswer any fo of the following: 2 Whois an Hacker? What motivates the hacker? Discuss the different classes of hacker Why do attacker need footprinting? What are the objectives of footprinting? What is vulnerability scanning? What can it detect? What is the benefit of drawing network diagrams? “a, ‘What is NTP enumeration? Whatdre the commands used for NTP enumeration? Exp!sin.° : Answer any two of the following: u How does Microsoft authentication tke place? Explain, How are hash passwords stored in Microsoft security accounts manager? How can Trojans be detected? What are the countermeasures against Trojans and Backdoors? ‘What are the different ways in which computer gets infected with virus? What ara the techniques nsed for infecting computers with viruses? Explain the two types of sniffing. What protocols are vulnerable to sniffing? Answer any two of the following: 12 What is a botnet? What is the purpose ef botnet? Explain the botnet propagation technique. Explain social engineering through impersonation on soeial networking sites. Explain directory traversal and web cache poisoning attacks, Explain active and passive session hijacking techniques, Answer any twa of the following: 2 What are the different web application threats? Explain. Explain the blackberry attack vectors. Explain each in brief. Explain SQL injection black box. pen testing. Explain the different wireless encryption techniques. ‘Answer any two of the following: 12 ‘What are the different types of intrusion detection systems? Explain, ‘What knowledge is required to program buffer overflows? What are the steps to create buffer overflows? ‘What is secured sockets layer? What is session identifier? Explain the SSL handshake protocol flow. ‘What is penetration testing? Why is it required? VS-Con, : 11042-14. e ‘ * © ser? t oRe are tea & J g we a an a IT- faper TT Ingoumaton Seelally oage (REVISED COURSE) @% Hours) QP Code : 17903 Max Marka: 60 (1) All questions () Ma liable naman wherever necessary und state the assumptions made, (3) Answers to the game question must be written together. (4) Numbers to the right indicate yuarks. (5) Drew newt labeled diagrams wherever necessary. (6) Use of Non-programmable calculators is allowed Answer any nwo of the following: 2 ‘What are the various risk framing components & explain relationship among them? Explain generic risk model in detail. Explain in brief the COBIT ARCHITECTURE, Explain OCTAVE with its key characteristics and criteria. Answer any two of the following: 12 Explain the types of IDPS technologies. Explain the different firewall technologies and policies. ‘What is token? Explain its different types along with pros and cons. Write a short note on Server Security Principles. Answer any two of the following: n List the most commonly logged types of information and their potential benefits. ‘Write a short note en Patch and Vulnerabilty Group, Elaborate briefly on the need for Log management. Write a short note on PKI components Answer any two of the following: 7 12 Explain ‘ the} of a disaster recovery plan. Le een gt acca agent set j ai nore at Spo Explain the uses of NMAP. Explain the basic sean type in MAP. ; collection of files done in forensic science? Hho ee iconv we he os popu vuln Seana!” ‘What does 150 17799. consist of? Explain briefly its protection classes and the a ms Garr IE) Gem) Eaam date ~o2r(t: dub ~ gnkermadt ior eens ~ Papert. - Embedded System Chew) | (REVISED COURSE) QP Code :17899. (2% Hours) Max Marks: 60 N.B.: (1) All questions are compulsory (2) Make suitable assumptions viherever necessary and state the assumptions m: (3) Answers to the same question must be written together (4) Numbers to the right indicate mark (5) Draw neat labeled diagrams wherever necessary (© Use of Non-programmahle calculators is allowed. Qi Answer any fvo of the following: 12 a, Differentiate between Embedded system and general compu! b. Explain the function of of an Embeddex c. Explain operational quality attributes of Embedded sy d. Explain analysis and support phases in Embedded system development | cycle. Q2 Answer any two of the followin; a. Explais quentiai Pr Model for Sevt Belt Warning b. Write a short note on Electronic Design Automation Tools. ¢c, Write a short note on Deyice Drivers. d. _ Explain High level language to machine language Q3 — Auswer any two of the following: 2 a. Whatis Memory Map? Why memory map is 1iecessary in design of Embedded systems? b. Explain Read and Write o} ¢. Explain Refresh Timing and Refresh add Interface. 4. Explain the Locality of Rete e used in cache memory Answer any fo of the followin; How C/C++ is useful in embedded system progr advantages of high level programming for em sedded b. What type of files can be included using In What are the disadvantages of standard C++? 1 Embedded C++ programs. d. Illustrate the use of Infinite loops with example in embedded system design ning. List the QS Answer any two of the followin a. Whatare the open standards, frameworks and alliances presents in the market? b. Draw the architecture of PIC processor. c. Explain the function of each bit of Siaius Register SREG of AYR microcontroller. d, Explain different processing modes of ARM. NS-Gan.s9356-14, IT - paper Ernbedkkled Sydtem 21s, = PonA fen Hy (REVISED COURSE) QP Code :17899 (A Hours) Max Marks: 60 N. B.: (1) All questions are compulsory. (2) Make suitable assumptions wherever necessary and state the assumptions made, (3) Answers to the same question must be written together, (4) Numbers to the right indicate marks. (5) Draw neat labeled diagrams wherever necessary. (©) Use of Non-programmable calculators is allowed. 1 Answer guy two of the following: nn Differentiate between Embedded system and general computing system. Explain the fanction of different components of an Emibedded system. Explain operational quality attributes of Embedded systems. Pepin analysis and support phases in Embedded system development life cycle. Z eesFO Q2 Answer any two of the following: 2 a. Explain the Sequential Program Model for Seat Belt Warning System. “b. Write a short note on Electronic Design Automation Tools. c. Write a short nate on Device Drivers. \d. Explain High level language to machine language conversion process. Q3 Answer any two of the following: 12 ja What is Memory Map? Why memory map is necessary in design of Embedded systems? Explain Read and Write operation of DRAM with timing diagram. Explain Refresh Timing and Refresh address in reference of DRAM memory Interface. $ Explain the Locality of Reference used in cache memory. Answer amy two of the following: 2 How C/C++ is useful in embedded system programming. List the various advantages of high level programming for embedded system. + What type of files can be included using Include Preprocessor directive? What are the disadvantages of standard C+? Explain Optimization of codes in Embedded.C++ programs. 3 TTlustrate the ase of Infinite loops with example in embedded system design. Answer any twa of the following: Z 2 What are the open standards, frameworks and alliances presents in the market? ‘Draw the architecture of PIC processor. , in the function of each bit of Status Register SREG of AVR ler. Explain different processing modes of ARM, & Seeg ¢ os #2 boos VS-Con.:9356-14. th a FOOL Elective t Viabuabization 70: a a ee (REVISED COURSE) QP Code : 17912 2% brs) Max Marks: 60 NB. (1) All questions are compulyo, Q) Make guital i ions wh slate the assumptions made, (3) Answers tothe sane quetion mus be wrten one ; (4) Numbers to tho right indicate ouuriy 2 (S) Drow meat tabeled diagrams wherever mecepsary, (9 Dow seat wherever nec . Ie calculators is allowed QI Answer any pwo of the following: Explain virtualization, virtual machine and virtual machine monitor. bi What are process virtual machi 2 xf What are the different types of virtualization? Explain storage virtualization. Sd; What are the advantages and disadvantages of virtualization? QZ Answer anv two of the following: a “a Explain Hardware partitioning, b. Give an overview of the following virtual hardware: Processor, Memory, Hard Disk Drive ¢ Discuss the supported anid unsupported operating systems on VMWare GSX, YM Ware ESX and Microsoft virtual Servers “ud. What is Disaster recovery? What is high availability? How can. virtualization help in disaster tecavery and high availability? QB Answer any two of the following: 12 a.” Explain the hierarchical architecture of wide area network. _b. Explain dynamic multipoint virtual private network. c. What are the different planes of virtual separation’ é. Explain the different options to transport multicast traffic between virtual devices. 4 “Answer any two of the following: 2 : Compare FCIP and iFCP. How SAN can be extended using PCL? and IFCP? Sb. What is SNIA? Why Is a modet required for shared storage? ‘ ~¢, Whatare the different categories of SCS! parallel interface’? Explain, @. Explain the different architectures for design of storage virtualization ‘Answer any to of the following: a So Discuss the different themes that apply to adaptation of blades and virtualization Nogies. Dai tno ‘memory and I/O considerations for blades, Explain server blades, /O modules and management modules. b i Discuss the evolution of grid/utility computing, ton. : 10525-14. Cubh— rey Sebo t embef4 shen C REN.) date— OF fas }2ols Pram (REVISED COURSE) QP Code : 14124 (24 Hours) Max Marks: 60 N.Bz (1) All questions are compulsory 2) Male suitable assumptions wher G3) Answers to the same question must (4) Numbers to the right indicate marks. t labeled diagrams wherever necessary. . allowed. sary and state th written together sumpti Ql Answer any rwn of the following: 12 & What is Embedded syste is i General S: that ‘components of typical embedded Explain jts role in Embe ».’ Wiustrate’ wit are die objectives plain cy ntexi, What are the digierent quality attributes to be considered in an embedded system design. Q Answer a ert of the following: 12 Embedded system design ‘Explain the different Embedded Firmware Design approaches Explain any three basic functions of Real Time Kernel. ee 8 Answer any two of the following: 12 Discuss the classification of ROMs. Write anote on DRAM design Explain the concepts of Caching. What is Dynamic memory allocation? peer plain in detail 4 Answer any vv of the following: R How C/ CH is useful in Pmbedded System programming? Mention their advantages. Weite a note on Header, Source files and Pre-progessor directives in ‘C’ programming Tanguage, Discuss the Data strtictures and modifiers in ‘C” programming language Explain the limitations of stindard JAVA. in embedded application development? FPS Answer any avo of the following: 12 Write @ note on Processor Trends in Eiibedded System, Discuss the Language Trends for Bmbedded System development. Explain the On-chip memory’ organization of PIC nilerocontvlle, Discuss Embedded OS trends in dotail. pose. AS - VF-Con. 337-15.

You might also like