Вы находитесь на странице: 1из 2

Sample Question Paper

Course Name : Computer Engg. Group


Course Code : CM/CO/IF
Semester : Fifth
9114
Subject : Computer Security
Marks : 80 Time: 3 Hrs.
Instructions:
1. All questions are compulsory.
2. Illustrate your answers with neat sketches wherever necessary.
3. Figures to the right indicate full marks.
4. Assume suitable data if necessary.
5. Preferably, write the answers in sequential order.
Note: Follow the sequence as per the question paper profile.

Q.1 Attempt any FOUR. 16 Marks


a. List and Describe basic components of computer security.
b. List the step in verifying authencity and integrity of the digital certificate.
c. Describe the of denial of service attack with help of diagram.
d. What is IP security? Describe Authentication Header mode of IP security.
e. With the neat diagram describe network intrusion system mechanism.
f. What does encryption means? Describe shiif cipher encryption technique.

Q.2 Attempt any TWO. 12 Marks


a. What is virus and Worms? Describe the virus spreading mechanism.
b. With respect to security policies, describe policies, standard, guideline and procedure.
c. Describe the handprint and Fingerprint mechanism for authentication of the user.

Q.3 Attempt any TWO. 12 Marks


a. Describe what is code injections and how to prevent code injection.
b. Describe caeser’s cipher substitution technique of cryptography
c. Describe buffer overflow and different status of the stack related to buffer overflow
Q.4 Attempt any TWO. 16 Marks
a. What is operating system security? Compare the security system of windows and Linux
operating system.
b. Describe single homed bastion and screened host gateway type of firewall
c. Describe the component of Host Based IDS? State its advantage and disadvantages.

Q.5 Attempt any THREE. 12 Marks


a. Describe Threat, Vulnerability and attack as characteristics of Computer Intrusion.
b. List the method of defense? Describe controls, Encryption related to defense methods.
c. Describe MD2, MD4, MD5 hashing functions.
d. Describe the requirement and solution to email security.

Q.6 Attempt any THREE. 12 Marks


a. What is Hash Function? Describe with example.
b. Describe the handwriting and signature process of verification.
c. Explain symmetric and asymmetric key cryptography.
d. List and describe different ways of web security.