Exam Details
Subject | information security | |
Paper | ||
Exam / Course | mca(integrated) | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | November, 2018 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA Integrated- SEMESTER- VII• EXAMINATION WINTER- 2018
Subject Code: 4470621 Date: 22/11/2018
Subject Name: Information Security
Time: 10.30 am to 01.00pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
State the types of computer criminals. How are they different from other criminals?
07
Explain the terms attacks and vulnerabilities.
07
Q.2
How could defense methods be used for safer computing?
07
How could time related errors pose a threat to information security?
07
OR
Explain the terms 1. Buffer Overflow 2. Flaws 3. Trusted System
07
Q.3
How are military security policies different from commercial security policies?
07
How does multilevel security help to keep information secure?
07
OR
Q.3
What are the ways to setup auditability access control?
07
How are the terms integrity, confidentiality and availability related to information security?
07
Q.4
What are the ways in which network vulnerabilities insecure information?
07
Why are threat in transit dangerous in keeping information secure?
07
OR
Q.4
Briefly explain protocol flaws with respect to information security.
07
How could one use integrity and confidentiality threats to keep information secure?
07
Q.5
How are organizational security policies used for information security?
07
Why should one perform risk analysis for building an information secure system?
07
OR
Q.5
How are computer related privacy problems an hindrance to information security?
07
Explain the similarities and differences among copyrights, patents and trade secrets with respect to information security.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA Integrated- SEMESTER- VII• EXAMINATION WINTER- 2018
Subject Code: 4470621 Date: 22/11/2018
Subject Name: Information Security
Time: 10.30 am to 01.00pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
State the types of computer criminals. How are they different from other criminals?
07
Explain the terms attacks and vulnerabilities.
07
Q.2
How could defense methods be used for safer computing?
07
How could time related errors pose a threat to information security?
07
OR
Explain the terms 1. Buffer Overflow 2. Flaws 3. Trusted System
07
Q.3
How are military security policies different from commercial security policies?
07
How does multilevel security help to keep information secure?
07
OR
Q.3
What are the ways to setup auditability access control?
07
How are the terms integrity, confidentiality and availability related to information security?
07
Q.4
What are the ways in which network vulnerabilities insecure information?
07
Why are threat in transit dangerous in keeping information secure?
07
OR
Q.4
Briefly explain protocol flaws with respect to information security.
07
How could one use integrity and confidentiality threats to keep information secure?
07
Q.5
How are organizational security policies used for information security?
07
Why should one perform risk analysis for building an information secure system?
07
OR
Q.5
How are computer related privacy problems an hindrance to information security?
07
Explain the similarities and differences among copyrights, patents and trade secrets with respect to information security.
07
Other Question Papers
Subjects
- advanced c programming (adv – c)
- advanced python
- basic mathematics for it
- big data
- c++ with class libraries (cpp)
- communication skills - ii
- communication skills-1
- cyber security and forensics (csf)
- data analytics with r
- data structure
- database management systems
- discrete mathematics for computer science (dmcs)
- environmental studies
- fundamentals of computer
- fundamentals of database management systems
- fundamentals of networking
- fundamentals of programming – i
- fundamentals of web
- information security
- java programming
- machine learning
- management information systems (mis)
- mobile programming
- network security
- operating system
- operations research
- python (py)
- software engineering
- software testing
- statistical methods
- uml & object oriented modeling
- web development tools