100% found this document useful (1 vote)
1K views2 pages

Question Paper Code: Reg. No.

This document is a question paper for an exam on computer science and engineering security practices. It contains 3 parts with multiple choice and written response questions. Part A contains 10 short answer questions worth 2 marks each on topics like encryption, firewalls, intrusion detection systems, access control, cyber forensics, and physical security threats. Part B contains 5 longer answer questions worth 13 marks each on topics such as intrusion prevention, web application security, internet security threats, wireless sensor network attacks, and identity management. Part C contains 1 long answer question worth 15 marks involving designing a security management system or privacy policies for a banking/loan scenario.

Uploaded by

Ponraj Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views2 pages

Question Paper Code: Reg. No.

This document is a question paper for an exam on computer science and engineering security practices. It contains 3 parts with multiple choice and written response questions. Part A contains 10 short answer questions worth 2 marks each on topics like encryption, firewalls, intrusion detection systems, access control, cyber forensics, and physical security threats. Part B contains 5 longer answer questions worth 13 marks each on topics such as intrusion prevention, web application security, internet security threats, wireless sensor network attacks, and identity management. Part C contains 1 long answer question worth 15 marks involving designing a security management system or privacy policies for a banking/loan scenario.

Uploaded by

Ponraj Park
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

*X86562* Reg. No.

Question Paper Code : X86562


M.E./M.Tech. Degree Examinations, April/may 2021
Second Semester
Computer Science and Engineering
CP5291 – Security practices
(Common to M.E. Mobile and Pervasive Computing)
(Regulations 2017)

Time : Three Hours Maximum : 100 Marks

Answer all questions

Part – A (10×2=20 Marks)

1. What is the role of encryption in cryptography ?

2. Write down the purpose of fault tolerance and resilience in cloud computing
environment.

3. How does firewall ensure network security ?

4. Define availability in terms of network.

5. List down any four intrusion detection systems.

6. Write down the significance of access control in data security.

7. What is cyber forensics ?

8. State the significance of e-discovery.

9. Classify conflicts in policies.

10. Name any four physical security threats.

Part – B (5×13=65 Marks)

11. a) Explain in detail intrusion detection and prevention mechanisms.


(or)
b) Discuss in detail about the security issues in web applications and web services.
X86562 *X86562*

12. a) Explain with real-time examples possible internet security threats and
elaborate on internet security mechanisms.
(or)
b) List down various types of attacks in Wireless Sensor Networks and discuss
about various techniques to ensure security in WSN.

13. a) Illustrate how policy-driven system management is implemented.


(or)
b) Discuss in detail about how identity and user management system could
provide data security.

14. a) Write short notes on :


i) Satellite encryption. (7)
ii) Password based authentication system. (6)
(or)
b) Elaborate on how Cyber forensics is related to Incidence response.

15. a) How does privacy enhancing technologies provide privacy on internet ?


Discuss.
(or)
b) What is Storage Area Network ? Discuss in detail about SAN security and the
SAN security devices.

Part – C (1×15=15 Marks)

16. a) Consider a scenario where an IT manager of a company spread across locations


in the country with people or different roles spread across, is assigned a task
of implementing a security management system. As a security expert suggest
various alternatives for the implementation by considering factors such as
organization structure and the system architecture.
(or)
b) Design privacy policies to provide security pertaining to a banking firm and a
Loan processing agency which is supposed to recommend loans on verification
of the Customer information such as account details, transactions made and
loans availed. Consider the roles bank manager, Loan officer, Customer.
Provide necessary security system designs and architecture.

_________________

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy