MCA Fifth Semester Computer Security Question Paper

BPUT MCA fifth semester Computer Security Question Paper 2010/MCA Fifth semester previous year question paper

MCA Fifth Semester Computer Security Question Paper 2010

Fifth Semester Examination- 2010
Time:3 Hours
Max. Marks:70

Answer question No. 1 which is compulsory and any five from the rest.
The figures in the right-hand margin indicate marks.

1. Answer the following questions:- [2*10=20]

(a) Differentiate between threat and vunerability.

(b) During the transmission of a message, the message was modified by unauthorized people.Which security principle violated?

(c) What is the basic principle behind the Caesar cipher?

(d) How an exhaustive attack is carried out and what is the main idea of exhaustive attack?

(e) Define Trusted Computing Base(TCB).

(f) Give an example of inference problem.

(g) What are the benefits of sensitivity lock with respect to database security?

(h) List two major security advantages of optical fibre over other transmission media.

(i) What is a DoS attack ?

(j) What is link encryption ?

2. (a) What are the Shannons characteristics of a good cipher? [5]

(b) What are the advantages and limitations of stream and block cipher. [5]

3. (a) Briefly describe the AES algorithm. [5]

(b) Compare the AES algorithm with does algorithm. [5]

4. (a) With an example explain the concept of buffer overflow. Discuss how the buffer overflow has security implications. [5]

(b) What do you understand by targeted malicious code? What are the different types of targeted malicious code? [5]

5. (a) What are the major issues to be dealt with while designing a trusted operating system? [5]

(b) Give a comparative assessment of security features of ordinary operating system with the security features of trusted operating system. [5]

6. (a) What is a Digital Signature? What are the properties of a digital signature? How trust is maintained in the digital signature? [5]

(b) What are the basic security requirements of a database? [5]

7. (a) What major security persists in computer networks? How the attackers perpetrate their attack on networks? [5]

(b) What are the different active codes used by the websites. How they can compromise your security? [5]

8. (a) What is link encryption and how it differs from end to end encryption? Discuss. [5]

(b) List the major reasons as to why computer crime is hard to prosecute. [5]

Related Articles

BPUT Fifth Semester MCA Java Question Paper 2010

MCA fifth semester Java question paper of 2010/BPUT previous year Java question paper/MCA Advanced Java question paper 2010/J2EE Question Paper of BPUT/BPUT previous year question paper/BPUT previous year MCA question paper

More articles: BPUT, Orissa


No responses found. Be the first to comment...

  • Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
  • No HTML formatting and links to other web sites are allowed.
  • This is a strictly moderated site. Absolutely no spam allowed.
  • Name: