0% found this document useful (0 votes)
35 views12 pages

Previous Question Paper (Ns & MAD)

Urgent of this pdf download

Uploaded by

Rupesh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
35 views12 pages

Previous Question Paper (Ns & MAD)

Urgent of this pdf download

Uploaded by

Rupesh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 12
example. (co-7) Q.27 Differentiate between symmetric and asymmetrickey cryptography? (C02) 2.28 How we can handle cyber assets? (CO-6) 2.29 Define digital signature and digital certification (CO-2) (0.30 Define cycle redundancy check. | (CO-2) Q.31 What is Worm? Explain its types. * (CO-3) @.32 Write down the various steps for modifying security policy. (co-8) 2.33 Explain various types of network disasters? (CO-8) Q.34 What is HTTP and SSH? (co2) Q.35 What are various principles of data security? (co) SECTION-D Note:Long answer type questions. Attempt any two outofthree questions. 2x10=20 @.36 Explain the term encryption. What are its methods? Explain them with suitable example. (co-2) 37 What is RAID, server redundancy and clustering? What is the role of disk mirroring in RAID management? Explain ts levels. (CO-8) Q.38 What are the advantages and disadvantages of afirewall? (CO-4) (Note: Course outcome/CO is for office use only) (2800) (4) 180862/170862/120862 No. of Printed Pages : 4 Role : 1180862/1708 6TH Sem. / Computer Engg. ‘Subject : Network Security Time : 3 Hrs. MM. : 100, SECTION-A Note:Multiple choice Questions. All questions are ‘compulsory (10x1=10) (Course OutcomelCO) 1 Which one of the following is a key function of, firewall? (co-4) a) Copying b) Moving ©) Deleting 4) Monitoring ‘Apperson who uses his or her expertise to gain access to other people's computers to get information ilegally ordodamageisa_ (CO-3) a) hacker b) Analyst ©) spammer 4) programmer SSL provides (co-2) ‘a)_messageintegrity b) confidentiality c) compression d)_alloftheabove The protocol POP’ stands for (co-4) 1a) _personalorfice protocol b)_ postoffice protocol -__ news val a5 Men rocptpvacy ‘cos a) Confidentiality b) integrity 6) authentication 4) noneoftheabay cs ting nieces eat a) 32bits >) 64>its ©) 128bits d) 256 bits 7 “arty bis" re used for which ofthe following purposes? (Cos) a) Encryption ofdatab) totransmitfaster 6) todetecterrors d) _toidentifythe user 08 Thetoms FTE stands fo? (eon) 3) Fokacsiuogae 2) Felsrensaen aaa 2) leant pon 0) Rte lead 29 D&S dane a) Data Encryption Standard b) DataEncryption Statistics ©) Dan Ercypton Syston 9) Daa Enypton Sequence Q10_ IS used to validate the identity of the message sendertotherecipient. (CO-2)) | ) Encryption b) °) Digital Certticate d) (2) 180862/170862/12086; Decryption None ofthese SECTION.B Note:Objective {ype questions. All questions are compulsory, 10x1=10 0.11 What are single points of failures? (C08) (Q.12 What is session in VPN? (co-7) Q.13 Any two limitations of IDS. (co-s) Q.14 What are outbound rules in firewall? (CO-4) Q.15 What is use of VPN? (co7) Q.16 Define Network disaster. (co-8) Q.17 Define IPS, (Co-5) Q.18 Define virus, (co-3) Q.19 Any two limitations of IDS. (co-5) Q.20 Define SSH (co-2) SECTION-C Note:Short answer type questions. Attempt any twelve questions out of fifteen questions. 12x5=60 Q.21 Write down various features of IT Amendment ‘Act 2008, (CO-1) Q.22 Why do we need secure network? (CO-6) Q.23 What are the limitations of intrusion detection system? (CO-5) 2.24 Explain the advantages of firewall? (CO-4) tion cipher encryption method? Q.25 Explain substitution cipher encryptios wey Q.26 Drawa neat diagram SECTION-D Note:Long answer type questions. Attempt any three ‘questions outoffourquestions. . 3x10=30 .33 What is VPN? What are its various types? Explain with the help of diagram. .34 What do youmean by RAID. What areits various levels? Explain in detail Q.35 What is virus? Explain its various components indetal Q.36 Write shortnote on . Digital signature b. Cyberethics Ngo Prnted Pages :4 Si line 1208627030885 6th Sem. ! Computer Engg. 17. ‘Subject : Network Security Time : 3 Hrs. MM. : 100 ‘SECTION-A Note:Objective type questions. All questions are ‘compulsory (10x1=10) Q1 Define firewall 2 Whatare end pointsin VPN? 3. Whatisciphertext? Q4 Define clustering. 5 DESstands for Q6 Define encryption. Q7 Define stream cipher. Q.8 Whatisinternetbackup? Q.9 Whatiseithical hacking? Q.10 SSH stands for SECTION-B Note: Very short answer type questions. Attempt any, ten questions outof twelve questions. 10x2=29 11 Whatis Se: .12 Define passive attacks? .13 Whatdo you mean by ethical hacking? 0.14 Define ferential backup. 15 Differentiate between HTTP and HTTPS. 0.16 Whatare igital cortiicates? .17 Nameany two IDS imitations. 0.18 Define SSH 0.19 Whatare various rewalltypes? 2.20 Definenon-repudiaton, 2.21 Whatis certifying authorities? 2.2 Define access controllist. @ SECTIONS Note:Short answer type questions. Attempt any sight questions outof ten questions. BxS=40 2.23 Whatis the need of network security? 0.24 Explain 3-DES withthe help of diagram. 2.25 What are various principles ofnetwork security? 2.26 What is cyber-crimes? What are its various types? 2.27 Explain RSA encryption wth diagram, (2.28 Explain MDS along withits various properties. (2.29 What do you mean by Worms? Explain its any twotypes. Q.30 Stale firewalls? Explain any two firewall functions in detai. 2.31 What are various types of hackers? Explain in detail. 2.32 Define clustering? What are its various. ‘advantages? @) 120862/0308654 on of 027 Differentiate between encryption and deerton (C08) (co2) (C02) daa? Q.28 Explain configuration policy ofcyber asses. Q.29 Define digital certficateand IPSec. Q30 Define cycle redundancy check Q31 Whatisapplicationlevel virusseannes? (CO) Q.32 Write anote on configuration of required objects it VPN. (CO-7) Q.33 Explain about network disasters. (CO8) Q34 Whatis process configuration? (C03) Q35. Whatis ethical hacking explain it with example? (CO-!) SECTION-D Note: Long answer type questions. Atempt any two questions out ofthe questions. Q36 What do you mean by heuristic scanners a explain deplaying virus protection (Q37 What are the types of firewall and its imitations? (CO-4) Q38 Writeshort note on the following 8) Host based IDS setup (cos) b)_ Disaster category (co#) (Note: Course outcome/C0 is for office use only) 180862/170762/ 120862030865 ‘No.of Printed Pages 0 pide ad twose2 70760) - 1208621030865 4h Sem / Computer Engs. Subject: Network Security Tine :3 Hrs, MM. : 100 SECTION-A Multiple choice questions. All questions are compulsory (xI-10) ‘The field that covers the variety of computer network, both public and private, that used in everyday job? (co) 2) Arial Ineligence » ML 91 &) Network Security Which one of the following is @ key function of Firewall? (co-4) a) Copying b) Moving: ©) Deleting 4d) Monitoring SSL provides (C02 ‘8) Messageintegrity b) Confidentilly ©) Compression _d)__Alloftheabove ‘Theprotocol ‘POP’ stand for (co) a) Personaloffie protocol 'b)_ Postoffice protocol ©) Privacy overall protocol 4) Privacy over protocol 6 2 QS Firewallsareused for a9 Qu0 isan example ofpublickey algorithm. (CO.9y a) RSA by DES ©) IREA @ RCS VPNstand for 2) Visual Public Network ) Virtual Publie Network (con ©) Virtual Private Network 4) Visual Private Network 7 purposes? 4) Encryptionofdata b) ») 2 a RAID stands for ” » 2 a Message sent a 9 party bts” are used for whieh of the following (C03) Totransmit faster Toidentify theuser (Co-4) ) Todetectertors — d) Routing Security Unauthorized acess Congestion contol (cos) Redundant array ofindependent disks Readingarray ofindependent disks Redundantaray of inter disks Redundant array ofindependen drives is used to validate the identity of the to the recipient. (CO-2) Encryption 'b) Decryption Digital Certificated) Noncofthese @ 180862/170762/ 120862/030865 SECTION-B Note: Objective type questions compulsory, (9.11 Define term security of data over internet: 0.12 WhatisITAct2000amended2008? —_(CO-1) 13 Define vinis Scanners, (€03) Q.14 Whatarethedifferenttypesofencryption? (Ct Q.15 DefinePGP. Q.16 Explainhost. QT Defineeyber rime. Q.18 WhatisIDS? Q19 Define VPN. 0.20 Expandclustering. AIL questions are (Ox1=10) (ony SECTION-C Note: Short answer type questions. Attempt any twelve questions outof fifteen questions, (125-60) Q.21 Writedown various features ofTTAct2000, (CO-1) ain the concept of encryption and decryption a as (c0-2) (23, Whatate the disposable policies in handling of cyber assetssystem? (co-6) {24 Explain IDS counter measures (cos) Q.25 Explain Digital signatures? op {Q.26 Draw a neat diagram of VPN and explain it example. (co-r) 180862/170762/ 1208621030865. ® Q28 Write the steps used in developing a mobile application ormakinga phone cal (co) Q.29 Summarize the procedure to ereate gallery (C0-6) android Q30 Explain about context menus used inandroid, (CO-6) Q31 Explain about geo coding and reverse geocoding i location-based services (C0-6) Q.32 Explain about the process of obtaining API keys in location-based services. (Co) Q.33 Explain the steps for accessing the web services in android. (€o-77) Q34 Describe the process of storing and retrieving the data from external storage (co-7) Q35 Describe the procedure to navigate to « specifi location in location-based services of android. (CO-7) SECTION-D Note: Long answer type questions. Attempt any two {questions out of three questions. Qx1 Q.36 Explain location-based servicesindetail. _ (CO-6) Q.37 Define mobile computing. Explain 3-tier architecture ‘ofmobile computing along with its diagram. (CO-1) Q.38 Describe the following: (c0-6), a) EditText view b)_ TimePicker view (Note: Course outcome/CO is for office use only) (4280) No. of Printed Pages : 4 Roll No, 180863/170863 / Computer Engineering MM. : 100 SECTION-A Note: Multiple choice questions. All questions are compulsory (10x1=10) QI Andoidis: (co-4) a) Webbrowser —b)_ Webserver ©) Operatingsystem d) Database Which ofthe following virtual machine is used by the Android operatingsystem? (CO-5) a) Simple viral machine >) Javavirtal machine ©) Dalvikyvrtual machine 4) Android virtual machine ‘Tier-2 in mobile computing architecture is also calledas: (co-2) a) Operatingtier —b)- Mobility ter ©) Applicationtier d)Alloftheabove ADT means: (co-) 4) _AllDevelopment Tool +b) Android Direction Tool means it will occupy the complete spree available onthe display ofthe device. (€0-6) a) wrap_content —_b)-_match_content ©) rap_parent 8) match_parent Toembeda web browserin your activity which view is used? (C0-6) 8) Edit View b) Chrome View ©) BrowserView d)_ WebView InAndroid,a view isalso knownas: (co-6) a) I b) Widget ) Scene @) PeView Which ofthe following isnot part of Android’s native libraries? (CO-4) 8) SQLite b) Webkit ©) Dalvik ) OpenGL Q9 Content provider includes (co-7y 8) ViewContacts _b) Add Contacts ©) DeleteContacts d)_Allofthe mentioned Q10 Which year was the Open Handset Alliance: announced: (co-4) a) 2006 b) 2007 ©) 2008 SECTION-B Note: Objective type questions. All questions are compulsory (10x1=10) Qt WEFT stands for (C03) (0.12 WEMAX standsfor_—— (C03) 0.13. Listany two android mobile devie manufactures. (CO-) 0.14 Givefull form of SDK. (C05) (0.15 Name any two atributes of RadioButton view.(CO-6) (0.16 TextViewisused for a (Co) Q.17 Givefull formofSMS, (0-6) Q.18 SQLiteisadatabasesystem.(TruelFalse) _(CO-1) 0.19 Givefull formof HTTP (co 0.20 Zoomcontrolisusedfor__. (co-7) SECTIC Note: Short answer type questions. Attempt any twelve ‘questions out of fifteen questions. (12x5=60) Q21 Discuss about the evolution of mobile computing. (co-1) Q.22. Explain about Android Runtime. (co-4) Q.23 List any five differences between wired and wireless ‘mechanism in mobile computing, (cou, Q.24. Explain any five features of android. (cOo-4) Q25. Explain about intentsavailableinandroid. — (CO-5) Q.26 Explain any five attributes of DatePicker view.(CO-6) 2 estes ToggeButo an natn von 3 = je (CO) 31 Explain the process of Downloading binary data in Android, (cO-5) Q.32 Give any five differences between FOMA and COMA. (co-2) SECTION-D Note:Long answer type questions. Attempt any three ‘questions outoffourquestions. 3x 10=30 @.33 What do you mean by Content Provider? Explain how it can be used for sharing data in Android, (cos) Q.34 What are different types Menu's in Android? Explain the working of any one type with example. (co-4) Q.35 What are different phases of life cycle of an activity in Android with the help of diagram. (co-3) Q.36 What is mobile computing? Explain its three tier architecture with the help of diagram. (CO-1) (Note: Course outcome/CO is for office use only) No.of Printed Pages RolNo 6th Sem. / Computer Engg. ‘Subject : Mobile Application Development Time 3 Hrs. MM: 100 SECTION-A Note:Objecive type questions. Al questions are compulsory (10x1=10) {Course Outcomelco) 1. NFCstands for (co) 2. Define mobi staton. (co-) 03 Event is called when the actviy becomes viibietotheuser. (003) 4 Whatis need of Progress Bar Viewin Anérig? (cos) 05 ___ Objects used to store data les locally ‘on Android device's internal memory. (CO-5) Q6 Define Network and Switching Subsystem. (CO-2) 7 Define GPRS. (002) 170863 28 List any two android devices in the market (coy 0.9 Which parameter is used to display text in Textview? (coy (2.10 Name any two manufactures and their mobile (coz) operating systems, SECTION-B. Note: Very Short answer type questions. Attempt any ten questions out of twelve questions. 10x2=20, 2.11 Define mobile computing (co-t) .12 Define Android Market. (co-3) 0.13.Give four names of companies and their ‘mobiles OS. (co-2) Q.14 ListanytwoGPRSapplications. _(CO-2) 0.15 Whatis Android SDK. (co-s) (2.16 What do you mean by Fragments in Android? (co-3) Q.17 Define reverse geo coding nAndroid. (CO-5) Q.18 Define Context Menu, (co) 2.19 Whatdoyoumeanby LinuxKeme!? (CO-2) 2.20 Define EditText View. 0.21 Listany two features of tutooth, 0.2 Define GSM. SECTIONS Note:Short answer type questions. tempt any five questiosoutoftenquestons. _5x6=40 (0.28 Explain the process of storing and Retioving data rom Extema storagein Android, (CO-5) 0.24 Whatis the use of Data Picker View in android? (co) 0.25 Explain various types of layouts in Android. (cos) 0.26 What is short Message Service? Explain its various strengths. (co-2) 0.27 Explain various steps for consuming web service ‘tough HTTPin Android. (cos) (0.28 What do mean by List View. Explain its use with thehelp of example. (co) 229 Differentiate between 3G and 46 Technology. (c02) 30 Explain the use of Radio button and Rao Group viewinAndroid wth example, (CO) (cosy (co2) rite how to Call buit-in application using 2.27 wre how to Call bitin applealon sid Q.28 Explain user interface with views and viewgroups, Display orientation? (CO-2) 0.29 Explain Text view, Button, Image Button, Edit Text? (CO-3) Q.30 Explain Time picker view, and Date Picker view? (co-3) 0.31 Explain analog and Digital view & Dialog Boxes. (0-3) .32 Explain how to display Pictures & Menu with views? (CO-3) 2.33 Explain Geo coding & reverse Geo coding? (co-4) Q.34 Explain any two Android Services? (CO-4) Q.35 Explain Storage with SQLite in Android?(CO-4) ‘SECTION-D Note:Long answer type questions. Attempt any two outofthree questions, 2x10=20 Q.36 Explain 3-Tier Architecture of Mobile Computing {CO-1) Q.37 Explain the steps for sending SMS, Receiving ‘SMS and Making phone call? (CO-3) Q.38 Explain Location based Services, content provide, SQLite in detail? (co) (2760) 180863/170863 Be eran | Roll No. 180863/170863 Computer Engineering. ‘Subject : Mobile Application Development Time: 3 Hrs. MM. 100 SECTION-A Note:Multiple choice Questions. All questions are ‘compulsory (10x1=10) (Course OutcomeiCO) 1 Which among these are not a part of Android's native libraries’ (co2) a) Webkit b) Dalvik ©) OpenGL d)_ Scite Dialog classes in Android? (co) a) AlertDialog ——_b) Progress Dialog ©) Date picker Dialogd) Allabove 1 you want share the data across the all applications, you should gofor? (co) a) Shared preference b) Content provider ©) Intemal storage 4) SQLite database Which year was the open handset alliance announced? (co-1) a) 2005 b) 2006 ©) 2007 200 @5 The Emulator is identical to running @ real phone ‘except when emulating/simulating what? (Co-1) a). Telephony b) Application ©) Sensor d) Allaspect Q.6. The XML file that contains all the next that your application uses? (co2) a) stack xm! b) textxmt ©) strings xml d) string java Q7 Creating @ Ul (User Interface) in Android requires careful use of. (co-2) a) javaandSQL —b)_xmlandjava ©) xmlandc++ Q8 ADT means: dreamweaver (co-2) a) Android Developmenttool b) Android Data ©) AllData Too! d)_AllDelete tool 9 HTTP means: a) Hyper Text Transfer Protocol b) Hard Text Transfer Protocol ©) Heavy Text Transfer Protocol d) Hyper Too! Text Place Q.10 Tim Picker is available in: a) Advanceview b) SMS. ©) Content provider d) Geocoding . (2) 1708 180869/170863 (co-3) SECTION-B Note:Objective type questions. All questions are ‘compulsory. 10x1=10 Q.11. Name Android mobile manufacturer_(CO-1) Q.12 What is the latest Android Operating system 1 es (0-1) Q.13 Meaning of ADT. (Co-2) Q.14 Whatis thenameAndroidRunTime__ (CO-2) Q.15 Meaning of AVD. (co-2) Q.16 Name Tier 1 ofAndroidarchitecture_ (CO-1) Q.17 Name Tier3 of Android architecture _(CO-1) Q.18 HTTP means, (cO-4) Q.19 DYM stands for (co-2) Q.20 SMS stands for (co-3) SECTION-C Note:Short answer type questions. Attempt any ‘twelve questions out of fifteen questions. 12x5=60 2.21 Write Mobile computing Security issue?(CO-1) Q.22 Compare wired and wireless mechanism? (CO-1) 23 Explain 3-Tier Architecture of Mobile Computing in brief? (co-t) Q.24 Write various features Wi-Fi and Wi-Max, Bluetooth? (CO-1) Q.25 Explain in Android its Features, Versions, Market, Runtime? (CO-1) Q.26 Explain how to install and configure Android? ¢ (co-2)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy