Exam Details
Subject | information security | |
Paper | paper 2 | |
Exam / Course | m.sc. computer science | |
Department | ||
Organization | rayalaseema university | |
Position | ||
Exam Date | December, 2017 | |
City, State | andhra pradesh, kurnool |
Question Paper
M.Sc. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2017.
Third Semester
Computer Science
Elective II
Paper II INFORMATION SECURITY
2 20935-AB
Time 3 Hours Max. Marks 70
SECTION — A
Answer any FIVE questions. 6 30 Marks)
Each question carries 6 marks.
1. Discuss about security problems.
2. Explain about Trojan horse.
3. Explain about substitution and transposition ciphers.
4. Explain about Message authentication.
5. Explain about message digest.
6. Explain about EI Gamal Algorithm.
7. Explain about auditing and logging.
8. Explain about system call monitoring.
SECTION — B
Answer ONE question from each Unit. 10 40 Marks)
Each question carries 10 marks.
UNIT I
9. Explain about the security aspects of data integrity and availability.
Explain about user authentication.
Or
10. Explain about the stack and buffer overflow.
Explain about intruders and threats.
UNIT II
11. Explain Data Encryption Standard.
Explain about ECC.
Or
12. Explain about RSA.
Explain about Hash functions.
UNIT III
13. Explain about symmetric key signatures.
Or
14. Explain about Public Key Infrastructure.
UNIT IV
15. Explain about Rule-Based Intrusion Detection.
Or
16. Explain about tripwire.
———————
Third Semester
Computer Science
Elective II
Paper II INFORMATION SECURITY
2 20935-AB
Time 3 Hours Max. Marks 70
SECTION — A
Answer any FIVE questions. 6 30 Marks)
Each question carries 6 marks.
1. Discuss about security problems.
2. Explain about Trojan horse.
3. Explain about substitution and transposition ciphers.
4. Explain about Message authentication.
5. Explain about message digest.
6. Explain about EI Gamal Algorithm.
7. Explain about auditing and logging.
8. Explain about system call monitoring.
SECTION — B
Answer ONE question from each Unit. 10 40 Marks)
Each question carries 10 marks.
UNIT I
9. Explain about the security aspects of data integrity and availability.
Explain about user authentication.
Or
10. Explain about the stack and buffer overflow.
Explain about intruders and threats.
UNIT II
11. Explain Data Encryption Standard.
Explain about ECC.
Or
12. Explain about RSA.
Explain about Hash functions.
UNIT III
13. Explain about symmetric key signatures.
Or
14. Explain about Public Key Infrastructure.
UNIT IV
15. Explain about Rule-Based Intrusion Detection.
Or
16. Explain about tripwire.
———————
Other Question Papers
Subjects
- big data analytics
- cloud computing
- datamining
- information security
- object oriented programming through java
- software engineering
- unix programming
- web technologies