You are on page 1of 5

No.

Date 2
2 202 2
Total Ne, of
questions: 9 Total no. of Puges: 1
CHANDIGARH ENGINEERING COLLEGE, LANDRAN
BTECHCSE
Second Mid-Semester Examination
Subject: Adhoc and Wireless Scnsor Networka
Time 15 Hrs Subjeet Code: BTCS-TI6-18
Max Marks: 24
INSTRUCTIONS TO CANDIDATES:
tion-A is compulsory consisting of four questions carrying
Section-B contains thrce guestions carvine four arks each andtwostudents
marks each
have to attempt any two questians
S. Section-C contains fwo questions carrying
eight muks cach and students have to attempt any one question.
Course Outcomes
COI Explain the
identify the Fundamental
u i t aCo h i eapPplications
a of ad hoc and wireless sensor otworks andd annly this knowledge to
ting aigorithm based on the network
CO2 Apply the knowledge to identify appropriate physical and MAC layer protocols
CO3 Understand the transport layer &Describe routing rotocols for ad boc wireless networks withrespect to TCP design issues
CO4 Be familiar with the OS used in Wircless Sensor
Networks and build basic modules
COs U'nderstand the Challenges in security provisioning Security Atacks& security issues possible in Adhoc
and Sensors N/w
Bloom's Tasonoy Levels

Ll-Rememberiny L2- Understanding, L3- Applying. L4-Analyzing, L5-Evaluating, L6-Creating


Section -A(4 questions x 2 marks 8 marks)
Marks Level lo
Relevance
Bloom
Distribution to CO No.
Taconomy
Define the term "Flooding attack (2) (COS)
2Compare and contrast between proactive routing and reactive routing (2) (CO3) L2
Summarize the advantages ofa clustered architcecture over a layered architecture in a
o Detwork (2) (CO4) L2

ate ay four reasans that leadtothe quick power drain of nodes in mobile ad hoc
network
(2) (CO4) LI
Section-B2 questions x4 marks-8 marks)
Marks Relevance Level to
Distribution to CO No. Bloom
Taxonomy
Propose the factors that will play major role in optimizing a wircless sensor network (4) (CO4) L6

6
List the various key management approaches in semsor network security, Expound al!
of them in details. (1434) (CO5) LA

ldentify the charscteristics of ideal routing protocol for ad hoc wireless network (4) (CO3)
Section-C(1 question x &marks =S marks)

Marks Relevance Level to


Distribution to CONo. Bloom
Taxonomy
Discuss Transport Protocol design issues. List down the examples of Transport Layer 312+3-8) (CO3) L4
Protocols. Also explain prproblems with Transport Control Protocol.
Classify the various layer wise attacks in wireless semor networks Recommend best (S+3-8) (COS) LS
9
possible solutions for jamming in sensor network security

Subjet Coordinator
1QcCopfdinator
Roll No.
slole289
Total No, of
questions: 9
De222
CHANDIGARH ENGINEERING cOLLEGE, LANDRAN
Total no, of Pages: I
BTECH CSE-7
Second Mid-Semester Examination
Subject: NetworkSecurity and Cryptograp1y
Time: 1.S Hrs Subject Code: BTCS-701-18
Max. Marks: 24
INSTRUCTIONS TO CANDIDATES:
1. Section-A is com
compulsory
2. Section-B contains consistingcarrving
three guestions of four four
questions
markcarry
eaching
andtwo marks have
students each. to attempt any two questions.
3. Section-C contains two guestions carrving eight marks cach and students have to attempt any
one question.
Course Outcomes
CO1
Understand the fundamental principles of access control models and techniques, authentication and secure system
CO2
design.
Have a strong understanding of different cryptographic protocols and techniques and be able to use them.
CO3
Apply methods for content integrity,
CO4
authentication, and access control
ldentify and mitigate software security vulnerabilities in existing
systems.
To develop an understanding of security policies and apply mcthods of Intrusion
COs
Prevention detection and
Bloom's Taxonomy Levels
LI- Remembering, L2- Understanding, L3- Applving. L4 - Analyzing, LS-
Evaluating, L6- Creating
Section -A(4 questions x 2 marks 8marks)
Level to
Marks Relevance
Distribution to CO No. Bloom
Taxonomy
List the classes of Intruders in brief. (2) (C04) LI
List down difference phases a virus go through in its lifetime. 2) (CO4) LI

Illustrate in brief the working of Elliptic Curve Cryptography. (2) (CO3) L2


Outline the scenarios where Kerberos is preferred. (2) (CoS) 12

Section-B(2 questions x 4 marks -8 marks)

Level to
Marks Relevance
Bloom
Distribution to CO No.
Taxonomy
Distinguish between a threat and Vulnerability (Any 4), Categorize in brief the (2+2) (CO4) 4
methods for identifying threats and Vulnerability in System.
6. Identify possible threats for RSA Algorithm. Apply RSA algorithm to perform (2+2) (CO3) L3
encryption and decryption using p3, q-11, e-7,N=S.
Asses the role of Digital signature in Network Security. Prioritize the properties that (2+2) (C04) LS
adigital signature should have.
Section -C(1 question x8 marks = 8 marks)
Marks Relevance Level to
Distribution to CO No. Bloom
(343+2-8) (CO5)
Analyze the role of Firewalls in Intrusion Detection. Examine the positive and LA
8
negative effects of Firewalls. List any two IDS available Software.
(44242-8) (CO3) L6
9 Elaborate in detail the SHA algorithm. Probe Why SHA is more secure than
S.Discuss the weak collision property ofa hash function
MDS.Dis

IQAC C
Rill N

Tl Nef çoetone9
Total na of Pagrs: 1
CHANDIGARH ENGINEERING COLLEGL LANDRAN
BTECH CSE
Secsad MisSemester Eaninaton
Sabject: Duta Mining snd Duta Warehousing
Tie L5 Hn Sebject Cade: BTCS703-18
MaL Marka: 24
INSTRUCTIONS TO CANDIDATES:
LSeci-Ais compsory
2. Secónn3f fb quetions crying thwo mars each
Carying four maa ch
3Secio-Ccontis to quetins carrying eight ms each ndand gtaáents
sadents have to atetay two qestions
bave to mpt ay one
Coerse Outeomes quet
Darte the concept of data warebouse and datu mining
C02 along with different data models
Casiy the mhematical foundations of data
pro-processing and dta mining
Demonstrte techm es for pemem
predictiaon and analysis from large dataset chalienge
Evaluate he resesrchmd desig of new Serch engine
Software
L Forlate the perfomance of varios deta mining
algorims
Blocm's Tuonomy Leveb
L-Remebering L2- Uhdentandng L3- Agelyng, L4 - Analyzing L5- Evnhuating L6- Crating
Sectias--A(4 questions x2 mark 8 marka)

Marka Relvance Leved to


Distriutiom Blocm
to CO No.
4. Define the term "Cluster Analysis". TEOnOy
2 (C03)
2List the various charscteristics of search engine. (21 (C04) 12
3nterpret the concept of Web mining tools (2) (C05)
A State the termmWeb Crawling". L 2) (005)
Seetion -B(2 qoestions x4 marks8 marks)

Mais Relevance
Diribution toCO NaTm
5 Classify the concept of Locality and Hierarchy in the web based on data (4) (CO5)
mining
Analyze the concept of scarch engine. Explatn its functicnality. v 2-24) (Co5)
Assess "enterprise scarch". Discuss the furnctionality f enterprise search 22-4) (C04)
engine software
Section -Cl guestion x&marks& marks)

Marka Relevance Level to


cin Distribution to CO No. Bloom
Taonomy
8. Tdentify web mining and data mining with the help glekample. IIs web (6+2-8) (C0S) 13
mining different from data mining? Discuss
Elaborate various clustering techniques or methods with the help of (8) (C03) L6
example.

Subject Coordinator 1QACtoordfaator HoD


Roll No. Date

Total No. of questions:9 Total no, of Pages:1


CHANDIGARH ENGINEERING COLLEGE, LANDRAN
B.TECH CSE-7
Seeund Mid-Semester Examination
Subject: Routing and Switching
Subject Code: BTEC-905A-18 MaL. Marks: 24
Time: 1.5 Hrs
INSTRUCTIONS TO CANDIDATES:
1.Section-A is compulsory consisting of four questions carrying two marks each.
2.Section-B contains three questions carryingfour marks cach and students have to atempt any two questions.
3. Section-C contains two questions carrying eight marks each and students have to attenpt any one qucstion.
Course Outeomes
Demonstrate a basic understanding of stnall and medium-sized networks, including general network technologics.
CO1
CO2Ability to assist the design of small and medium-sized networks, and implement the designs.
CO3 Understand the storage technologies into their networks in order tosupport a variety of applications.
CO4 Abilityto construct simple networks and integrate voice, wireless, cloud, security.
Bloom's Taxonomy Leves

LI-Remembering L2-Understanding. L3- Applying, LA-Analyzing, L5- Evaluating. L6- Creating


Section -A(4 questions x 2 marks8marks)
Level to
Marks Relevance
to CO No. Bloom
Distribution
Taxonomy
(2) (CO3) 12
Outline the concept of Network address translation.
List out various Features of lPsec. (2) (CO4)
How can we establish enterprise radio anccess network solutions? 2 (CO3)
Interpret the concept of Generic Routing Encapsulation. 2 (C04)
Section-B2guestions X4 marks 8marks)

Level to
Marks Relevance
Distribution to CO No. Bloom
Taxonomy

Explain Authentication based on a Shared Secret Key and establishing a Shared (4) (C04)
Key with examples.
(CO3) L
6
ldentify the various principles of Frame relay in detail. Explore its Advantages and (2+2=4)
Disadvantages.
(2+2-4) (CO3) LA
Simplify the termn "DSL" and "ADSsL". Interpret the principle of establishing
DS/ADSL networks with PPPoE.
Section-C(1 question x 8 marks = 8marks)
Level to
Marks Relevance
Bloom
Distribution to CO No.
Taxonomy
ElaborateACLthe should
th¡t an
role of Access Control the
have. Explain List different
(ACL) intypes
networkof security. PrioritizeListrules
Access Coutro! in (2+3+3-8) (C04) L6

details.
Examine the working of VLAN in details with the help of on example. Classify the (3+243-8) (CO3) L4
various types of VLAN. List out the different features offered by VLAN,
Date

Na ef questions: Total na. of Pages: 1


CHANDIGARH ENGINEERING COLLEGE, LANDRAN
BTECH CSE-h
Second
men
Subject Cede: BTCS-710-18 MaL Marks: 24

1ONS TOo
SeetionA iscompulsory DIDATES: four questions carrying two marks cach
Section-B contains hrec guestions carrvine four markeach and students have to attempt any two questiona.
Section-Ccontains two questions carrying eight maris cach and students have to attempt any oe q
Course Outeomes

cO1Understand concept of agile sofhware engineering and its advantages in software development
CO2 Explain the role of design peinciples in agile software design
CO3 Define the core practices behind Scrum framework
CO4Understand key principles of agile sotware developnent metbodologs-Kanban
Describe implications of functional 1esting, unit testing, and continuous integration.
CO6 Understand the various tools available to agile toams to test the project.
Bloom's Taxonomy Levcs
L5- Evaluating L6- Creating
LI- Remembering. L2-Understanding, L3- Applying, L4- Analyzing,
Section-A(4 questions x2 marks& marks)
Level to
Marks Relevance Blogm
Distributionto CO No Taxon
2) T(COS) L
Why code refactoring in important in Agile Testing? 2) (CO4)
Interpeet the role of regression test in extreme programming
(2) (CO5)
responsibilities.
Outline the role of all the members of the XP tean and their
2) (CO4) LI
Show the significance and usability of adding policies to the board in any project
Section -B2 questions x4 marks-&marks)
Levei to
Marks Relevance
Bloom
Distribution to CO No.

(4) (COS)
Mention the welve principles ofextreme programming in the software development
process
from the L4
Analyze the working of the kanban board and ditferentiate its working (242) |(CO)
6
sCRUM framework
Examine in detail he acile life cycle and the impact of this
life cycle on testine (2+2) cO6) LA
Section C(lquestion x 8 marks 8 marks)

Marks Relevance
Distribution to CO No.
Taxonomy
How testing in agile framework is different from testing done in waterfall model? (4+4) (CO6)
Explain the principle that are important for agile tester
(4+4) (CoS) L6
Elaborate the basic values of extreme programming and mention two tools to
9
implement extreme programming.

Subject Coordinator 1QAC Coordinator HOD

You might also like