You are on page 1of 1

5 A 7 C

65 BA 610 0210 0D6 637 CE C2F F49F F4C EE


BA 61 21 D 63 CE C2 49 4C EE 35
5B 6 02 0D 66 7C C F4 F4 E 3 2D
1 3 5
BAA61 021 10D 663 7CE EC2 2F49 9F4C CEE E35 2D6 665B
0 0 6 7 F
61 2 D 63 C C 4 4 E 35 D 65 AF 2
61 021 10D 663 7CE EC2 2F49 9F4 CEE E35 2D6 665B BA6 610
61 021 0D 663 7CE C2 F49 F4 CEE 35 2D6 65B A6 10 210
02 0 66 7C C F F CE 3 2D 6 A 1 21 D

f
e
c
a
02 10DD66 37C EC 2F4 49F4 4CE E35 52D 665 5BA 610 021 0D6 6637
3 0

d
b
1 2

f.
f.
f.
f.

e.
c.
a.
e.
c.
a.
e.
c.
a.
e.
c.
a.

d.
b.
5.
4.
d.
b.
3.
d.
b.
2.
d.
b.
1.
21 0D6 663 7CE EC2 F49 9F4C CEE E352 2D6 665B BA6 6102 210 D66 637C CEC
0D 63 7C C F4 F4 E 35 D 65 A 10 10 D6 37 E 2F
0D 663 7C EC 2F4 9F4 CE E35 2D 665 BA 610 210 D6 637 CE C2F 49
2 F
D6 6637 7CE EC2 F49 9F4C CEE E352 2D6 665B BA6 6102 210DD66 637C CEC C2F 49F 4CE

68320
63 CE C2 F49 F4 EE 35 D6 65B A6 10 10 66 37 EC 2F 49F 4C E3
66 7C C F4 F CE 3 2D 65 A 1 21 D6 3 CE 2 49 4C EE 52
37 EC 2F 9F 4C E 52 66 B 61 02 0D 63 7C C F4 F4 E 35 D
CE 2 49 4C EE 35 D6 5B A6 02 10 66 7C EC 2F 9F C E3 2D 66

Discuss.

lifecycle.
C2 F49 F4 EE 35 2D6 65 A 10 10 D66 37 EC 2F 49F 4C EE3 52 66 5B
F4 F4 CE 35 2D 65 BA 610 210 D6 37 CE 2F 49 4C EE 52 D6 5B A6
9F CE E3 2D 66 BA 61 21 D 63 CE C2 49 F4 EE 35 D6 65 A 10
4C E 52 6 5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 610 21
EE 352 D6 65B A6 102 10D 66 37C EC 2F 9F CE E3 52D 66 BA 61 21 0D

administration?
on a VM server?
35 D6 65 A 10 10 66 37 EC 2F 49F 4C E3 52 66 5B 61 021 0D 663
2D 65 BA 61 21 D6 37 CE 2 49 4C EE 52 D6 5B A6 02 0D 66 7C
66 BA 61 021 0D 63 CE C2 F49 F4 EE 35 D6 65 A 10 10 66 37 EC
5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 61 21 D6 37 CE 2
A6 102 10 66 37C EC 2F 9F CE E3 52D 66 BA 61 021 0D 63 CE C2 F49
10 10 D6 37 EC 2F 49F 4C E3 52 66 5B 61 02 0D 663 7C C F4 F4
21 D6 63 CE 2 49 4C EE 52 D6 5B A6 02 10 66 7C EC 2F 9F CE
0D 63 7C C F4 F4 E 35 D 65 A 10 10 D6 37 E 2F 49 4C E
66 7C EC 2F4 9F CE E3 2D 665 BA 61 21 D6 63 CE C2 49 F4C EE 352
37 EC 2F 9F 4C E 52 66 B 61 02 0D 63 7C C F4 F4 E 35 D
CE 2 49 4C EE 35 D6 5B A6 02 10 66 7C EC 2F 9F C E3 2D 66

Explain the features of firewall.


C2 F49 F4 EE 35 2D6 65 A 10 10 D66 37 EC 2F 49F 4C EE3 52 66 5B

Explain Database-Level Security.


Explain public key Cryptography.
F4 F4 CE 35 2D 65 BA 610 210 D6 37 CE 2F 49 4C EE 52 D6 5B A6

Explain the authorization systems.


9F CE E3 2D 66 BA 61 21 D 63 CE C2 49 F4 EE 35 D6 65 A 10

Write a short note on integrity risks.


4C E 52 6 5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 610 21

Attempt any three of the following:


Attempt any three of the following:
Attempt any three of the following:
Attempt any three of the following:
Attempt any three of the following:

EE 352 D6 65B A6 102 10D 66 37C EC 2F 9F CE E3 52D 66 BA 61 21 0D


35 D6 65 A 10 10 66 37 EC 2F 49F 4C E3 52 66 5B 61 021 0D 663
N. B.: (1) All questions are compulsory.

Write a short note on hubs and switches.

Explain different classic security models.


2D 65 BA 61 21 D6 37 CE 2 49 4C EE 52 D6 5B A6 02 0D 66 7C

Explain network availability and security.


66 BA 61 021 0D 63 CE C2 F49 F4 EE 35 D6 65 A 10 10 66 37 EC
5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 61 21 D6 37 CE 2
Write a short note on Network-Layer Attack.

Write a short note on trustworthy computing.


Write a short note on Private Bank Exchange.
A6 102 10 66 37C EC 2F 9F CE E3 52D 66 BA 61 021 0D 63 CE C2 F49
Explain the best practices for network defence.
10 10 D6 37 EC 2F 49F 4C E3 52 66 5B 61 02 0D 663 7C C F4 F4
(4) Numbers to the right indicate marks.

21 D6 63 CE 2 49 4C EE 52 D6 5B A6 02 10 66 7C EC 2F 9F CE

What are components of Voice Over IP? Explain.


0D 63 7C C F4 F4 E 35 D 65 A 10 10 D6 37 E 2F 49 4C E

Explain the five different types of wireless attacks.


66 7C EC 2F4 9F CE E3 2D 665 BA 61 21 D6 63 CE C2 49 F4C EE 352
(2½ Hours)

37 EC 2F 9F 4C E 52 66 B 61 02 0D 63 7C C F4 F4 E 35 D
CE 2 49 4C EE 35 D6 5B A6 02 10 66 7C EC 2F 9F C E3 2D 66
Explain the two most common approaches of security.

Explain the Cisco Hierarchical Internetworking model.

Page 1 of 1
C2 F49 F4 EE 35 2D6 65 A 10 10 D66 37 EC 2F 49F 4C EE3 52 66 5B
F4 F4 CE 35 2D 65 BA 610 210 D6 37 CE 2F 49 4C EE 52 D6 5B A6
Define authentication. Explain two parts of authentication.

9F CE E3 2D 66 BA 61 21 D 63 CE C2 49 F4 EE 35 D6 65 A 10
4C E 52 6 5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 610 21
EE 352 D6 65B A6 102 10D 66 37C EC 2F 9F CE E3 52D 66 BA 61 21 0D
Explain various components used to build a security program.

Explain intrusion Defense System types and detection models.

What is cloud computing? Explain the types of cloud services.


(5) Draw neat labeled diagrams wherever necessary.
(6) Use of Non-programmable calculators is allowed.

35 D6 65 A 10 10 66 37 EC 2F 49F 4C E3 52 66 5B 61 021 0D 663


2D 65 BA 61 21 D6 37 CE 2 49 4C EE 52 D6 5B A6 02 0D 66 7C

_____________________________

52D665BA610210D6637CEC2F49F4CEE3
66 BA 61 021 0D 63 CE C2 F49 F4 EE 35 D6 65 A 10 10 66 37 EC

Write a short note on Security Information and Event Management.


5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 61 21 D6 37 CE 2
A6 102 10 66 37C EC 2F 9F CE E3 52D 66 BA 61 021 0D 63 CE C2 F49
(3) Answers to the same question must be written together.

Explain the security considerations for choosing a secure site location.


10 10 D6 37 EC 2F 49F 4C E3 52 66 5B 61 02 0D 663 7C C F4 F4
21 D6 63 CE 2 49 4C EE 52 D6 5B A6 02 10 66 7C EC 2F 9F CE
0D 63 7C C F4 F4 E 35 D 65 A 10 10 D6 37 E 2F 49 4C E
What are the three recognized variants of malicious mobile code? Explain.
What are the importance of information protection? Explain with example.

66 7C EC 2F4 9F CE E3 2D 665 BA 61 21 D6 63 CE C2 49 F4C EE 352

What are the countermeasures against the possible abuse of wireless LAN?
37 EC 2F 9F 4C E 52 66 B 61 02 0D 63 7C C F4 F4 E 35 D
Paper / Subject Code: 88702 / Security in Computing

CE 2 49 4C EE 35 D6 5B A6 02 10 66 7C EC 2F 9F C E3 2D 66
C2 F49 F4 EE 35 2D6 65 A 10 10 D66 37 EC 2F 49F 4C EE3 52 66 5B
F4 F4 CE 35 2D 65 BA 610 210 D6 37 CE 2F 49 4C EE 52 D6 5B A6
9F CE E3 2D 66 BA 61 21 D 63 CE C2 49 F4 EE 35 D6 65 A 10

Explain the different factors for securing the assets with physical security devices.
4C E 52 6 5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 610 21
EE 352 D6 65B A6 102 10D 66 37C EC 2F 9F CE E3 52D 66 BA 61 21 0D
35 D6 65 A 10 10 66 37 EC 2F 49F 4C E3 52 66 5B 61 021 0D 6
2D 65 BA 61 21 D6 37 CE 2 49 4C EE 52 D6 5B A6 02 0D 66
66 BA 61 021 0D 63 CE C2 F49 F4 EE 35 D6 65 A 10 10 66
5B 6 02 0D 66 7C C F4 F4 CE 3 2D 65 BA 61 21 D6 37
A6 102 10 66 37C EC 2F 9F CE E3 52D 66 BA 61 021 0D 63
10 10 D6 37 EC 2F 49F 4C E3 52 66 5B 61 02 0D 663 7C
What are the three primary categories of storage infrastructure in modern storage security?

Define virtual machine. How is hypervisor responsible for managing all guest OS installations

Explain the reasons for remote administration security. What are advantages of web remote
Explain the application security practices and decisions that appear in most secure development
21 D6 63 CE 2 49 4C EE 52 D6 5B A6 02 10 66 7C
0D 63 7C C F4 F4 E 35 D 65 A 10 10 D6 37 E
[Total Marks: 75]

(2) Make suitable assumptions wherever necessary and state the assumptions made.

66 7C EC 2F4 9F CE E3 2D 665 BA 61 21 D6 63 CE
37 EC 2F 9F 4C E 52 66 B 61 02 0D 63 7C C
CE 2 49 4C EE 35 D6 5B A6 02 10 66 7C EC

15
15
15
15
15

C2 F49 F4 EE 35 2D6 65 A 10 10 D66 37 EC 2


F4 F4 CE 35 2D 65 BA 610 210 D6 37 CE 2F
9F CE E3 2D 66 BA 61 21 D 63 CE C2 4
4C E 52 6 5B 6 02 0D 66 7C C F4
EE 352 D6 65B A6 102 10D 66 37C EC 2F 9
35 D6 65 A 10 10 66 37 EC 2F 49F
2D 65 BA 61 21 D6 37 CE 2 49
66 BA 61 021 0D 63 CE C2 F49 F4
5B 6 0 0 66 7C C F F

You might also like