0% found this document useful (0 votes)
86 views

Computer System Security KNC 401

Uploaded by

hamup14
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views

Computer System Security KNC 401

Uploaded by

hamup14
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Printed Pages:02 Sub Code:KNC401

Paper Id: 238059 Roll No.

B. TECH
(SEM IV) THEORY EXAMINATION 2022-23
COMPUTER SYSTEM SECURITY
Time: 3 Hours Total Marks: 100
Note: Attempt all Sections. If require any missing data; then choose suitably.

SECTION A

1. Attempt all questions in brief. 2 x 10 = 20


(a) Differentiate threat and vulnerability.
(b) Explain integer overflow.
(c) Explain advanced anti XSS tools.
(d) Differentiate IDS and IPS.
(e) Explain web security.
(f) Describe three benefits of IPSec.
(g) Differentiate symmetric and asymmetric encryption.
(h) Explain three-way handshake.
(i) Define firewall with its usage. 90

2
13
(j) Differentiate RIP and OSPF protocol.
_2

2.
P2

24
SECTION B
3E

5.
2. Attempt any three of the following: 10x3=30

.5
P2

(a) Define control hijacking with an example. Explain buffer overflow in control
hijacking.
17
Q

(b) Compare access control in Windows with the access control in UNIX.
|1
(c) Define cross site request forgery and explain defenses against it.
3

(d) Explain IP security.


:2

(e) Describe packet filtering firewall along with its types.


: 24

SECTION C
13

3. Attempt any one part of the following: 10x1=10


3
02

(a) Discuss vulnerability management for security of computer system.


(b) Explain format string vulnerability attack.
-2
08

4. Attempt any one part of the following: 10x1=10


1-

(a) Explain the significance of system call interposition.


|0

(b) Demonstrate VM based isolation with example.

5. Attempt any one part of the following: 10x1=10


(a) Explain cross site scripting with XSS finding vulnerabilities.
(b) Explain threat modelling. Also discuss threat modelling methodologies.

QP23EP2_290 | 01-08-2023 13:24:23 | 117.55.242.132


6. Attempt any one part of the following: 10x1=10
(a) Discuss SHA-512 algorithm in detail by showing its all steps.
(b) Discuss RSA algorithm. Also show the encryption and decryption process by
considering P=3, Q=11 and plain text =5

7. Attempt any one part of the following: 10x1=10


(a) Elaborate Routing security.
(b) Explain Link Layer connectivity and TCP/IP connectivity.

90

2
13
_2

2.
P2

24
3E

5.
.5
P2

17
Q

|1
3
:2
: 24
13
3
02
-2
08
1-
|0

QP23EP2_290 | 01-08-2023 13:24:23 | 117.55.242.132

You might also like