0% found this document useful (0 votes)
54 views2 pages

Computer System Security KNC 301

This document is a question paper for a Computer System Security exam containing 7 sections with multiple choice and long answer questions. Some of the topics covered include computer security, ransomware, encryption, hashing, viruses vs worms, SQL injection, control hijacking, system calls, browser isolation, RSA algorithm, intrusion detection systems, security threats, confinement, rootkits, cross-site request forgery, cross-site scripting, symmetric and asymmetric cryptography, digital signatures, firewalls, DNS security and routing security. Students are required to attempt questions from each section covering these essential concepts in computer system security.

Uploaded by

yashiupadhyay111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views2 pages

Computer System Security KNC 301

This document is a question paper for a Computer System Security exam containing 7 sections with multiple choice and long answer questions. Some of the topics covered include computer security, ransomware, encryption, hashing, viruses vs worms, SQL injection, control hijacking, system calls, browser isolation, RSA algorithm, intrusion detection systems, security threats, confinement, rootkits, cross-site request forgery, cross-site scripting, symmetric and asymmetric cryptography, digital signatures, firewalls, DNS security and routing security. Students are required to attempt questions from each section covering these essential concepts in computer system security.

Uploaded by

yashiupadhyay111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Printed Pages:2 Sub Code:KNC301

Paper Id: 233075 Roll No.

B.TECH.
(SEM III) THEORY EXAMINATION 2022-23
COMPUTER SYSTEM SECURITY
Time: 3 Hours Total Marks: 50
Note:
1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A

1. Attempt all questions in brief. 1 x 10 = 10


Qno. Question

a. What is computer security? Discuss confidentiality and integrity.


b. What is Ransomware?

2
90

13
c. What is the use of frame busting in web security?
_2

2.
d. Differentiate between encryption and decryption in cryptography.
P2

24
e. Discuss software fault isolation.

5.
3D

.5
f. What is use of kernel in Unix operating system?
P2

g. Define hash function. What is the use of hash function? 17


Q

|1
h. What is the main difference between virus and worm?
4

i. What is SQL injection attack ? Explain in brief.


:1
31

j. What is difference between Cache Memory and RAM ?


:
13

SECTION B
3

2. Attempt any three of the following: 5x3=15


02

a. What is control hijacking? Discuss the various types of hijacking attacks in detail.
-2
03

b. What is system call interposition? Explain ptrace and systrace in detail.


1-

c. Discuss browser isolation and remote browser isolation in detail.


|2

d. Explain RSA algorithm with the help of suitably chosen example.


e. What is an Intrusion Detection System (IDS)? Discuss the various approaches
adopted in developing IDS system.

QP23DP2_290 | 21-03-2023 13:31:14 | 117.55.242.132


SECTION C
3. Attempt any one part of the following: 5x1=5
a. Describe various types of security threats in detail.
b. Explain the different types of defenses used against control hijacking.
4. Attempt any one part of the following: 5x1=5
a. Define confinement principle. Discuss the approaches of confinement at different
levels.
b. What are Rootkits? Discuss the various types of Rootkits in detail.
5. Attempt any one part of the following: 5x1=5
a. What is cross site request forgery? Explain the concept with suaitable examples.
b. Discuss the defenses and protection against cross site scripting.
6. Attempt any one part of the following: 5x1=5

2
90
a. Describe Symmetric key and Asymmetric key Cryptography eith due emphasis

13
_2

on the difference between them.

2.
P2

24
b. What is digital signature? Discuss the various steps used in creating digital
signature.

5.
3D

.5
P2

7. Attempt any one part of the following: 5x1=5 17


Q

|1
a. What is firewall? Explain packet filtering firewall in detail.
4

b. Write short note on the following:


:1
31

(i) DNS security


:

(ii) Routing security


13
3
02
-2
03
1-
|2

QP23DP2_290 | 21-03-2023 13:31:14 | 117.55.242.132

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy