Professional Documents
Culture Documents
Date 2
2 202 2
Total Ne, of
questions: 9 Total no. of Puges: 1
CHANDIGARH ENGINEERING COLLEGE, LANDRAN
BTECHCSE
Second Mid-Semester Examination
Subject: Adhoc and Wireless Scnsor Networka
Time 15 Hrs Subjeet Code: BTCS-TI6-18
Max Marks: 24
INSTRUCTIONS TO CANDIDATES:
tion-A is compulsory consisting of four questions carrying
Section-B contains thrce guestions carvine four arks each andtwostudents
marks each
have to attempt any two questians
S. Section-C contains fwo questions carrying
eight muks cach and students have to attempt any one question.
Course Outcomes
COI Explain the
identify the Fundamental
u i t aCo h i eapPplications
a of ad hoc and wireless sensor otworks andd annly this knowledge to
ting aigorithm based on the network
CO2 Apply the knowledge to identify appropriate physical and MAC layer protocols
CO3 Understand the transport layer &Describe routing rotocols for ad boc wireless networks withrespect to TCP design issues
CO4 Be familiar with the OS used in Wircless Sensor
Networks and build basic modules
COs U'nderstand the Challenges in security provisioning Security Atacks& security issues possible in Adhoc
and Sensors N/w
Bloom's Tasonoy Levels
ate ay four reasans that leadtothe quick power drain of nodes in mobile ad hoc
network
(2) (CO4) LI
Section-B2 questions x4 marks-8 marks)
Marks Relevance Level to
Distribution to CO No. Bloom
Taxonomy
Propose the factors that will play major role in optimizing a wircless sensor network (4) (CO4) L6
6
List the various key management approaches in semsor network security, Expound al!
of them in details. (1434) (CO5) LA
ldentify the charscteristics of ideal routing protocol for ad hoc wireless network (4) (CO3)
Section-C(1 question x &marks =S marks)
Subjet Coordinator
1QcCopfdinator
Roll No.
slole289
Total No, of
questions: 9
De222
CHANDIGARH ENGINEERING cOLLEGE, LANDRAN
Total no, of Pages: I
BTECH CSE-7
Second Mid-Semester Examination
Subject: NetworkSecurity and Cryptograp1y
Time: 1.S Hrs Subject Code: BTCS-701-18
Max. Marks: 24
INSTRUCTIONS TO CANDIDATES:
1. Section-A is com
compulsory
2. Section-B contains consistingcarrving
three guestions of four four
questions
markcarry
eaching
andtwo marks have
students each. to attempt any two questions.
3. Section-C contains two guestions carrving eight marks cach and students have to attempt any
one question.
Course Outcomes
CO1
Understand the fundamental principles of access control models and techniques, authentication and secure system
CO2
design.
Have a strong understanding of different cryptographic protocols and techniques and be able to use them.
CO3
Apply methods for content integrity,
CO4
authentication, and access control
ldentify and mitigate software security vulnerabilities in existing
systems.
To develop an understanding of security policies and apply mcthods of Intrusion
COs
Prevention detection and
Bloom's Taxonomy Levels
LI- Remembering, L2- Understanding, L3- Applving. L4 - Analyzing, LS-
Evaluating, L6- Creating
Section -A(4 questions x 2 marks 8marks)
Level to
Marks Relevance
Distribution to CO No. Bloom
Taxonomy
List the classes of Intruders in brief. (2) (C04) LI
List down difference phases a virus go through in its lifetime. 2) (CO4) LI
Level to
Marks Relevance
Bloom
Distribution to CO No.
Taxonomy
Distinguish between a threat and Vulnerability (Any 4), Categorize in brief the (2+2) (CO4) 4
methods for identifying threats and Vulnerability in System.
6. Identify possible threats for RSA Algorithm. Apply RSA algorithm to perform (2+2) (CO3) L3
encryption and decryption using p3, q-11, e-7,N=S.
Asses the role of Digital signature in Network Security. Prioritize the properties that (2+2) (C04) LS
adigital signature should have.
Section -C(1 question x8 marks = 8 marks)
Marks Relevance Level to
Distribution to CO No. Bloom
(343+2-8) (CO5)
Analyze the role of Firewalls in Intrusion Detection. Examine the positive and LA
8
negative effects of Firewalls. List any two IDS available Software.
(44242-8) (CO3) L6
9 Elaborate in detail the SHA algorithm. Probe Why SHA is more secure than
S.Discuss the weak collision property ofa hash function
MDS.Dis
IQAC C
Rill N
Tl Nef çoetone9
Total na of Pagrs: 1
CHANDIGARH ENGINEERING COLLEGL LANDRAN
BTECH CSE
Secsad MisSemester Eaninaton
Sabject: Duta Mining snd Duta Warehousing
Tie L5 Hn Sebject Cade: BTCS703-18
MaL Marka: 24
INSTRUCTIONS TO CANDIDATES:
LSeci-Ais compsory
2. Secónn3f fb quetions crying thwo mars each
Carying four maa ch
3Secio-Ccontis to quetins carrying eight ms each ndand gtaáents
sadents have to atetay two qestions
bave to mpt ay one
Coerse Outeomes quet
Darte the concept of data warebouse and datu mining
C02 along with different data models
Casiy the mhematical foundations of data
pro-processing and dta mining
Demonstrte techm es for pemem
predictiaon and analysis from large dataset chalienge
Evaluate he resesrchmd desig of new Serch engine
Software
L Forlate the perfomance of varios deta mining
algorims
Blocm's Tuonomy Leveb
L-Remebering L2- Uhdentandng L3- Agelyng, L4 - Analyzing L5- Evnhuating L6- Crating
Sectias--A(4 questions x2 mark 8 marka)
Mais Relevance
Diribution toCO NaTm
5 Classify the concept of Locality and Hierarchy in the web based on data (4) (CO5)
mining
Analyze the concept of scarch engine. Explatn its functicnality. v 2-24) (Co5)
Assess "enterprise scarch". Discuss the furnctionality f enterprise search 22-4) (C04)
engine software
Section -Cl guestion x&marks& marks)
Level to
Marks Relevance
Distribution to CO No. Bloom
Taxonomy
Explain Authentication based on a Shared Secret Key and establishing a Shared (4) (C04)
Key with examples.
(CO3) L
6
ldentify the various principles of Frame relay in detail. Explore its Advantages and (2+2=4)
Disadvantages.
(2+2-4) (CO3) LA
Simplify the termn "DSL" and "ADSsL". Interpret the principle of establishing
DS/ADSL networks with PPPoE.
Section-C(1 question x 8 marks = 8marks)
Level to
Marks Relevance
Bloom
Distribution to CO No.
Taxonomy
ElaborateACLthe should
th¡t an
role of Access Control the
have. Explain List different
(ACL) intypes
networkof security. PrioritizeListrules
Access Coutro! in (2+3+3-8) (C04) L6
details.
Examine the working of VLAN in details with the help of on example. Classify the (3+243-8) (CO3) L4
various types of VLAN. List out the different features offered by VLAN,
Date
1ONS TOo
SeetionA iscompulsory DIDATES: four questions carrying two marks cach
Section-B contains hrec guestions carrvine four markeach and students have to attempt any two questiona.
Section-Ccontains two questions carrying eight maris cach and students have to attempt any oe q
Course Outeomes
cO1Understand concept of agile sofhware engineering and its advantages in software development
CO2 Explain the role of design peinciples in agile software design
CO3 Define the core practices behind Scrum framework
CO4Understand key principles of agile sotware developnent metbodologs-Kanban
Describe implications of functional 1esting, unit testing, and continuous integration.
CO6 Understand the various tools available to agile toams to test the project.
Bloom's Taxonomy Levcs
L5- Evaluating L6- Creating
LI- Remembering. L2-Understanding, L3- Applying, L4- Analyzing,
Section-A(4 questions x2 marks& marks)
Level to
Marks Relevance Blogm
Distributionto CO No Taxon
2) T(COS) L
Why code refactoring in important in Agile Testing? 2) (CO4)
Interpeet the role of regression test in extreme programming
(2) (CO5)
responsibilities.
Outline the role of all the members of the XP tean and their
2) (CO4) LI
Show the significance and usability of adding policies to the board in any project
Section -B2 questions x4 marks-&marks)
Levei to
Marks Relevance
Bloom
Distribution to CO No.
(4) (COS)
Mention the welve principles ofextreme programming in the software development
process
from the L4
Analyze the working of the kanban board and ditferentiate its working (242) |(CO)
6
sCRUM framework
Examine in detail he acile life cycle and the impact of this
life cycle on testine (2+2) cO6) LA
Section C(lquestion x 8 marks 8 marks)
Marks Relevance
Distribution to CO No.
Taxonomy
How testing in agile framework is different from testing done in waterfall model? (4+4) (CO6)
Explain the principle that are important for agile tester
(4+4) (CoS) L6
Elaborate the basic values of extreme programming and mention two tools to
9
implement extreme programming.