K.K. Wagh Polytechnic,Nashik-3. Question Bank

superfluitysmackoverΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 6 μήνες)

63 εμφανίσεις

K.K. Wagh Polytechnic,Nashik
-
3.

Question Bank

Class:

TYCM




Semester

:

V

Subject:
Computer Security (
COS
)




Code:

12177


Chapter
1
:


1.

With the help of neat diagram,

explain

the following

I)

SYN Flood Attack

II)

Bucket
-
Bridge Attack




6m

2. Explain the following terms



4m


I. Back Door and Trap Door


II .R
eplay Attack


III.TCP/IP Hijacking


IV. Encryption Attack


3. List d
ifferent type of attack. Describe

any two in detail



6m


4.
Explain Denial of Service attack with the help of diagram




4m


5.
List and d
escribe the basic component of computer security.




4m


6.
Define the data security, information security, network security

& computer security




2m


7.

What is virus and worms. Describe the virus spreading
m
echanism.




4m


8. W
hat is virus, explain the phases of virus.




4m


9.

What is virus? L
ist and ex
plain different types

of virus.



4m


10
.
Describe the following terms


i)

Overwriting viruses


ii)

Stealth viruses



4m



11. W
hat is access control? List and explain all access control

model
s



6m


12. W
hat is Sniffing and Spoofing with different example.



4m


13.
Descri
be the term authentication. Explain authentication

method.



6m


14. Ex
plain Insiders and Intruders



4m


15. Explain the threat to security in detail.



6m


16. Explain Authentication and Authorization.








4m


17. Explain Trojan horse and Phishing.









4m


18. Explain Active attacks with example.









6m


19. Explain Passive attacks with example.








6m


20. Compare virus and worm.










4m


Chapter
2
:


1.

What is Dumpster Diving? How it can be prevented? Enlist security



leaks related to Dumpster Diving



6m

2.

Explain th
e role of people in security.



4m

3.

With respect to security policies describe policies,

standard
,
guidelines


a
nd procedure.










6m

4.

Describe with neat sketch diagra
m finger print mechanisms for



Authentication

of the user



6m

5.

Describe Social Engineering with example.



4m

6.

Explain the Physi
cal Security in the computer system and network.



4m

7.

What is biometric ,state its importance, list different biometric used in



Computer

S
ecurity.












4m

8.

Describ
e Security Policy Life Cycle.



4m
9.

Describe Piggybacking.






4m

10.

Explain Access Control Mechanism.









4m

11.

Explain Password Selection Method.









4m






12.

Explain the following
-











4m


a) Piggybacking


b) Shoulder Surfing


c) Installation of Unauthorized Hardware or Software

13.

Describe the Network Security Model wit
h Neat Diagram.





6m

14.

What is network security? Explain.








4m

15.

List the different Biometric Factors used for authentication.





4m

16.

What is Physical Security Barrier?








4m



Chapter 3:


1. What

is key
distribution?
Explain two probl
e
ms of key distribution with example.


8
m




2
. What is Hash function? What is collision in Hash function and name the attack


by it can be genera
ted?




4M

3.

Give the

four
key steps

for creating a

digital certificate.







4M

4.

Explain rail
-
fence technique with suitable e
xample





4M

7. What

is trusted
relationship?
Explain any 1 trust model.







4M

8.

Describe the step & perform simple column transposition technique



on the following with column size=6 and read o/p with o
rder of



Column

as 4
, 6, 1,2,5,3
.

COME
HOME TOMMOROW






4M


9.

Explain the terminology used in stenography






4M

10.

Describe Caesar’s cipher encryption algorithm.





4M

11
.

Exp
lain


symmetric and asymmetric key cryptography.





4M

12
.

Illustrate Deffi
e
-
hell
man key exchange algo.




8
M

13
.

Explain DES

algorithm
.






4M

1
4
.

Diff
e
rence between substitution and transposition tech.





4M

1
5
.

Explain

any one
transposition tech. with eg





6
M

1
6
.

Explain

any one

substitution tech. with eg.






4M

17. Describe the step & perform Rail fenc
e technique technique
on



the following


I AM HACKER”





4M



18. De
scribe the step & perform Caeser’s Cipher Substitution



technique
on the following

“COMPUTER SECURITY IS IMPORTANT”



4M

19.
Describe the step of verification of digital certificate.




4M

20.
D
escribe steps for obta
ining a digital
certificate.




4M

21.
Compare shift cipher and substitution cipher.




4M

22.
List and explain different fields of digital certificate.




4M

23.
Describe secure hash

function.




4M

24. D
escribe DES algorithm for i) Plain
Text ii
) Key Generation




6M

25.
What does encryption means?
Explain

shift cipher encryption technique.


4M

26.
What is plain text? What i
s cipher text? What is o/p of plain text “SPICEJAR” if we use



Caesar cipher to encode it?




4M

27.
Differentiate between MD5 and SHA




4M

28.
How does columnar transposition technique

work? Explain the algorithm


4M

29.
What is hash function and message digest.




4M


Chapter 4:



1. What

is IP security
? Describe authentication He
ader mode of IP security.



8
m

2. What

is Kerberos? Explain with diagram different se
rver
s

involve in
Ke
r
beros
.


8m

4. Explain

e
-
mail security
techniques (
protocol)
.




4m

5. Describe

working principle of firewalls.




4m

6.

Explain

VPN with neat
diagram. Enlist

different VPN protocol




4m

7.

What is
firewall? List

different type
s

of f
irewall.





4m

8.

How PGP is used for email security
?




4m

9. Describe

IP security architecture.





8m

10
. What

are the limitations of firewall
?




4m

11
. Why

emails are preferred over snail
mail? Enlist

RFC 822 for mail.





4m

12
. What

is security topology?






4m

13
. Describe

security zone in
details
.





4m

14. Describe the working of single homed bastion and screen host


gateway type firewall with ex. A
nd sketch




8m

15. List and explain four techniques enforced by firewall to control access


a
nd enforce security policy.




4m

16. Describe working of PEM e
-
mail security.




4m


Chapter 5
:


1.

Explain any four password polici
es.




4M

2.

Describe

the components of host ba
sed IDS.State adv and disadv.




8
M

3.

What is O. S. hardening ? what happen if you don’t harden.?Describe general s
tep for
securing windows O.S.




8M

4.

Describe IDS and its two types.




8M

5.

Explain the following terms with exampl
e
hotfix, patch,service pack.




6
M

6.

Explain the different ways u
sed for password management.




8M

7.

Describe UNIX/LINUX hardening.




4M

8.

Describe Window hardening
.









4M

9.

Describe

weakness of Windows
O.S.




4M


10.


Define system security and patch.




4M

11.


Give steps to secure windows OS.




6M

12.


Give four criteria’s used for password management.




4M

13.


Give four ex of Computer Intrusion.




4M

14.


Explain difference between hotfix and service pack. Why are they important.


4M

15.


What is IDS? Explain host based

and network based IDS.




8M

16.


Describe threat, vulnerability and attack characteristics of Computer Intrusion.

4M

17.


What is application hardening? Describe Unix OS hardening.




6M


Chapter 6
:


1.

Explain SSL in detail.







4m

2.

Explain the architecture of SSL






6
m

3.

List and describe different ways of web security






4m

4.

What are different components of SET






4m

5.

Name

the three protocol of secure socket Layer.
Describe in brief.


6m



6.

What are the key participant is SET.






6m


7.

What is code injection ? How it can be prevented.






4m

8.

Descr
ibe any six good characteristic for software
development.




4m



9.

Describe the buffer over flo
w and different status related
to buffer over flow.


6m

10.


Describe SSL protocol stack with ex.








6m

11.


Describe SET process.










6m

12.


State 8 good practices of software development.






4m

13.


How does SET protects the payment information from the merchant.



6m






Ms. M. Bhowmik



Mr.G.B.Katkade

(Subject Teacher)


(HOD CM Dept.)