Exam Details
Subject | information security | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | January, 2019 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- III EXAMINATION WINTER 2018
Subject Code: 3630012 Date: 11-01-2019
Subject Name: Information Security
Time: 10.30 am to 1.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Answer the following
1. What is risk in information security?
2. List five vulnerabilities of the vending machine.
3. Distinguishes between a hacker and cracker.
4. What is Confidentiality?
5. Name any three non-malicious programming errors.
6. What is SQL Injection attack?
7. What is characteristic of a good security policy?
07
Answer the following
1. What are the characteristics of Information Security?
2. Name different Message integrity threats.
3. What is patent?
4. What is a Threat in Transit?
5. What is Stream Cipher?
6. What is Reconnaissance?
7. What is NSLookup?
07
Q.2
What purpose the CIA triangle serves for System Security? Explain in detail.
07
What are vulnerabilities? Explain the software Vulnerabilities.
07
OR
Explain the Unexpected Behavior.
07
Q.3
What is Buffer Overflow? Explain using a small code-snippet and appropriate diagram.
07
Discuss different types of faults. How would you fix them?
07
OR
Q.3
What are Nonmalicious program errors? Explain Incomplete Mediation Security problem.
07
What is web anonymity? Is there any Browser on such anonymity principle?
07
Q.4
Explain Clark-Wilson Commercial Security Policy
07
Examine different routes by which vulnerabilities are presented in the Networks.
07
OR
Q.4
Explain characteristics of a Good Security Policy.
07
Explain Eavesdropping and Wiretapping.
07
Q.5
How can a web site distinguish between lack of capacity and a denial-of-service attack?
07
Describe three form of protection and compare in several significant ways.
07
OR
Q.5
Briefly Explain Computer-Related Privacy Problems.
07
List Computer related privacy problems and explain any one.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- III EXAMINATION WINTER 2018
Subject Code: 3630012 Date: 11-01-2019
Subject Name: Information Security
Time: 10.30 am to 1.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Answer the following
1. What is risk in information security?
2. List five vulnerabilities of the vending machine.
3. Distinguishes between a hacker and cracker.
4. What is Confidentiality?
5. Name any three non-malicious programming errors.
6. What is SQL Injection attack?
7. What is characteristic of a good security policy?
07
Answer the following
1. What are the characteristics of Information Security?
2. Name different Message integrity threats.
3. What is patent?
4. What is a Threat in Transit?
5. What is Stream Cipher?
6. What is Reconnaissance?
7. What is NSLookup?
07
Q.2
What purpose the CIA triangle serves for System Security? Explain in detail.
07
What are vulnerabilities? Explain the software Vulnerabilities.
07
OR
Explain the Unexpected Behavior.
07
Q.3
What is Buffer Overflow? Explain using a small code-snippet and appropriate diagram.
07
Discuss different types of faults. How would you fix them?
07
OR
Q.3
What are Nonmalicious program errors? Explain Incomplete Mediation Security problem.
07
What is web anonymity? Is there any Browser on such anonymity principle?
07
Q.4
Explain Clark-Wilson Commercial Security Policy
07
Examine different routes by which vulnerabilities are presented in the Networks.
07
OR
Q.4
Explain characteristics of a Good Security Policy.
07
Explain Eavesdropping and Wiretapping.
07
Q.5
How can a web site distinguish between lack of capacity and a denial-of-service attack?
07
Describe three form of protection and compare in several significant ways.
07
OR
Q.5
Briefly Explain Computer-Related Privacy Problems.
07
List Computer related privacy problems and explain any one.
07
Other Question Papers
Subjects
- advance database management system
- advanced biopharmaceutics & pharmacokinetics
- advanced medicinal chemistry
- advanced networking (an)
- advanced organic chemistry -i
- advanced pharmaceutical analysis
- advanced pharmacognosy-1
- advanced python
- android programming
- artificial intelligence (ai)
- basic computer science-1(applications of data structures and applications of sql)
- basic computer science-2(applications of operating systems and applications of systems software)
- basic computer science-3(computer networking)
- basic computer science-4(software engineering)
- basic mathematics
- basic statistics
- big data analytics (bda)
- big data tools (bdt)
- chemistry of natural products
- cloud computing (cc)
- communications skills (cs)
- computer aided drug delivery system
- computer graphics (cg)
- computer-oriented numerical methods (conm)
- cyber security & forensics (csf)
- data analytics with r
- data mining
- data structures (ds)
- data visualization (dv)
- data warehousing
- data warehousing & data mining
- database administration
- database management system (dbms)
- design & analysis of algorithms(daa)
- digital technology trends ( dtt)
- discrete mathematics for computer science (dmcs)
- distributed computing (dc1)
- drug delivery system
- dynamic html
- enterprise resource planning (erp)
- food analysis
- function programming with java
- fundamentals of computer organization (fco)
- fundamentals of java programming
- fundamentals of networking
- fundamentals of programming (fop)
- geographical information system
- image processing
- industrial pharmacognostical technology
- information retrieving (ir)
- information security
- java web technologies (jwt)
- language processing (lp)
- machine learning (ml)
- management information systems (mis)
- mobile computing
- molecular pharmaceutics(nano tech and targeted dds)
- network security
- object-oriented programming concepts & programmingoocp)
- object-oriented unified modelling
- operating systems
- operation research
- operations research (or)
- pharmaceutical validation
- phytochemistry
- procedure programming in sql
- programming skills-i (ps-i-fop)
- programming skills-ii (ps-oocp)
- programming with c++
- programming with java
- programming with linux, apache,mysql, and php (lamp)
- programming with python
- search engine techniques (set)
- soft computing
- software development for embedded systems
- software engineering
- software lab (dbms: sql & pl/sql)
- software project in c (sp-c)
- software project in c++ (sp-cpp)
- software quality and assurance (sqa)
- statistical methods
- structured & object oriented analysis& design methodology
- system software
- virtualization and application of cloud
- web commerce (wc)
- web data management (wdm)
- web searching technology and search engine optimization
- web technology & application development
- wireless communication & mobile computing (wcmc)
- wireless sensor network (wsn)