0% found this document useful (0 votes)
16 views

Science Bsc Information Technology Semester 6 2024 April Security in Computing Cbcs

The document outlines an examination for a course on Security in Computing, detailing various topics and questions related to cybersecurity concepts such as the CIA triad, encryption methods, and network security. It emphasizes the importance of understanding security models, types of attacks, and authentication processes. Students are required to attempt a selection of questions, demonstrating their knowledge and application of security principles.

Uploaded by

aqsanoveltystore
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Science Bsc Information Technology Semester 6 2024 April Security in Computing Cbcs

The document outlines an examination for a course on Security in Computing, detailing various topics and questions related to cybersecurity concepts such as the CIA triad, encryption methods, and network security. It emphasizes the importance of understanding security models, types of attacks, and authentication processes. Students are required to attempt a selection of questions, demonstrating their knowledge and application of security principles.

Uploaded by

aqsanoveltystore
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Paper / Subject Code:88702 /Security in Computing

FRLA9X.3iYC

3iYCENEA9N63IVCN

TIME: 2%, Hours Total Marks: 75


N. B.: (1) All questions are compulsory.
(2) Make suitable assumptions wherever necessary and state
A the
3 Iassumptions
Y C S E Amade.
9X6

(3) Answers to the same question must be written together.


(4) Numbers to the right indicate marks.
(5) Draw neat labeled diagrams wherever necessary.
(6) Use of Non-progràmmable calculators is allowed.

1. Attempt any threeof the following: 15

Describe three Ds of security in context of your.own home and organization.


b Comment on "The defender has theimpossible job of protection than the job of attacker."
ESEA9N6:3CESE
C. Give the significance of adefense model-Onion model
d. Explain the following: E-mail worms, Trojans.
e. List and brief the diferent form of Man-in the- middle attacks (MITM):
3!YCF8E 19X63iYCESEKNcsiyCE

f Discuss three aspects of CIA triad.

2. Attempt any three of the following: 15

What is the concept of zoning in the fundamental'storage infrastructure? Explain.


b. Explain the Certificate based mechanism of Authentication.
C. Describe the asymmetric and symmetric key encryption.
d. Discuss the concepts of different Database backups.
Explain the following terms: Hijacking, Phishing
f
Summarize the steps of the authentication process of Smart card implementation.

15
3. Attempt any threeof the following:
a Explain the following terms: NAT, PAT.
b. Write ashort note on the Cisco Hierarchical lnternetworking model.
C Describe the concepts of Network hardening.
d. What are the mandatory features of Firewall? Explain.
e. Explain switches and Hubs.
f. Which are the different form of wireless attacks? Explain.

52552 Page 1 of 2
CESEA9Nh3i1AC9
1NAE
9)NC6H
*sSE

Paper /Subject Code: 88702CENEA9NGsiYES


/ Security
EA in N
Gomputing
GIYCTNLAy
CESEA9x6

4. Attempt any tlhree of the following:


a. Give the significance of IDS.
b. List and explain the steps of successful IPS deploymentplan.
C. Describe the evolution of modein VoIP Communication with its components.
d. Explain Network ProtocolAttacks.
e. What are the types of classic security models? Explain.
f. Write a short note on Access Control List.

5. Attempt any threeof the following:


a. Explain the classification of corporate physical assets.
b. Which factors have to be considered in physical security while choosing a site-location?
A9X6 .3!YC
Explain. 9No3!YCESEAY\63IYCTE

C. Write a shortnote on Custom Remote Administration.


d. . Describe the different phases of Secure Development Life cycle (SSDL).
91G3iYCFSEA

Give the benefits of CloudComputing Security services.


What are the ge'eral types of attacks in web applications? Explain.
A9X631YCESE
A9Nh3tyCi A9X63Y
eNiYCNt
SEASNeR!yCE

.CH8A9X63!VCNEASN6i1e

A9K6!YCESEAVNGS?fwss

X63IYCH8EA9X6
5:1CiA9X631Ck
8EAONA3;VCHSEK63!\CEN!A9X

52552 Page 2 of 2

You might also like