Exam Details
Subject | information security | |
Paper | ||
Exam / Course | mca(integrated) | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | May, 2017 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA INTEGRATED SEMESTER VII- • EXAMINATION SUMMER 2017
Subject Code: 4470621 Date: 04/05/2017
Subject Name: Information Security
Time: 02:30 P.M. To 5:00P.M. Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Define following:-
(a)Difference between Hackers and Crackers
(b)Trade Secret
Masquerade
(d)Social Engineering
(e)Hactivism
(f)Intellectual Property
(g)Anonymity
07
Explain Security Goals.
03
(ii)Explain Computer Criminals.
04
Q.2
Explain Website Vulnerabilities.
07
Explain Security Threats in detail.
07
OR
Difference between active v/s passive attacks.
04
Explain Classification of Hackers.
03
Q.3
Explain Chinese Wall Security Policy.
07
Explain SQL Injection in detail.
07
OR
Q.3
Explain Military Security Policy.
07
Explain Security Requirements.
04
Explain Trusted System.
03
Q.4
Explain Content of Security Plan.
07
(i)Explain Man-in-the-Middle Attack.
04
(ii)Explain Eavesdropping and Wiretapping.
03
OR
Q.4
(i)Explain Packet sniffer and Session Hijacking
04
(ii)What is Business Continuity Plan? Explain characteristics of it.
03
Explain Characteristics of a Good Security Policy.
07
Q.5
Explain U.S.Privacy Laws.
07
What are the steps to Protect against Privacy Loss?
07
OR
Q.5
Compare Copyright, Patent and Trade Secret Protection
07
Explain Computer related Privacy Problems.
04
(ii)Difference between Anonymity and Multiple Identities and Pseudonymity.
03
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA INTEGRATED SEMESTER VII- • EXAMINATION SUMMER 2017
Subject Code: 4470621 Date: 04/05/2017
Subject Name: Information Security
Time: 02:30 P.M. To 5:00P.M. Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Define following:-
(a)Difference between Hackers and Crackers
(b)Trade Secret
Masquerade
(d)Social Engineering
(e)Hactivism
(f)Intellectual Property
(g)Anonymity
07
Explain Security Goals.
03
(ii)Explain Computer Criminals.
04
Q.2
Explain Website Vulnerabilities.
07
Explain Security Threats in detail.
07
OR
Difference between active v/s passive attacks.
04
Explain Classification of Hackers.
03
Q.3
Explain Chinese Wall Security Policy.
07
Explain SQL Injection in detail.
07
OR
Q.3
Explain Military Security Policy.
07
Explain Security Requirements.
04
Explain Trusted System.
03
Q.4
Explain Content of Security Plan.
07
(i)Explain Man-in-the-Middle Attack.
04
(ii)Explain Eavesdropping and Wiretapping.
03
OR
Q.4
(i)Explain Packet sniffer and Session Hijacking
04
(ii)What is Business Continuity Plan? Explain characteristics of it.
03
Explain Characteristics of a Good Security Policy.
07
Q.5
Explain U.S.Privacy Laws.
07
What are the steps to Protect against Privacy Loss?
07
OR
Q.5
Compare Copyright, Patent and Trade Secret Protection
07
Explain Computer related Privacy Problems.
04
(ii)Difference between Anonymity and Multiple Identities and Pseudonymity.
03
Other Question Papers
Subjects
- advanced c programming (adv – c)
- advanced python
- basic mathematics for it
- big data
- c++ with class libraries (cpp)
- communication skills - ii
- communication skills-1
- cyber security and forensics (csf)
- data analytics with r
- data structure
- database management systems
- discrete mathematics for computer science (dmcs)
- environmental studies
- fundamentals of computer
- fundamentals of database management systems
- fundamentals of networking
- fundamentals of programming – i
- fundamentals of web
- information security
- java programming
- machine learning
- management information systems (mis)
- mobile programming
- network security
- operating system
- operations research
- python (py)
- software engineering
- software testing
- statistical methods
- uml & object oriented modeling
- web development tools