0% found this document useful (0 votes)
110 views1 page

CS ST2-2019

This document is an examination for a cyber security course taken by third year students specializing in computer science or electrical engineering. It contains instructions for the exam, which has three sections and lasts two hours. Section A contains 5 short answer questions worth 2 marks each. Section B contains 4 out of 6 longer answer questions worth 5 marks each. Section C contains 2 out of 3 even longer answer questions worth 10 marks each. The questions cover a range of cyber security topics including storage policies, viruses vs worms, trapdoors, spoofing, Trojan horses, data backup techniques, digital signatures, data disposal, access control, intrusion detection systems, VPNs, public key cryptography, firewalls, and e-commerce security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views1 page

CS ST2-2019

This document is an examination for a cyber security course taken by third year students specializing in computer science or electrical engineering. It contains instructions for the exam, which has three sections and lasts two hours. Section A contains 5 short answer questions worth 2 marks each. Section B contains 4 out of 6 longer answer questions worth 5 marks each. Section C contains 2 out of 3 even longer answer questions worth 10 marks each. The questions cover a range of cyber security topics including storage policies, viruses vs worms, trapdoors, spoofing, Trojan horses, data backup techniques, digital signatures, data disposal, access control, intrusion detection systems, VPNs, public key cryptography, firewalls, and e-commerce security threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

B. Tech.

: THIRD YEAR
ST-II Examination (ODD SEMESTER, 2019-20)
SEMESTER: V BRANCH: CSE & EEE SECTION:A, B, C
Subject Name: Cyber Security
Time: 2 Hours. Date of Examination: 01/10/2019 Max. Marks: 50
(Following Paper Code and Roll No. to be filled in your Answer Book)
PAPER CODE: RUC-501 Roll No.

Note: Do as Directed. Missing data if any may be suitably assumed and mentioned. Symbols have their
usual meaning.
CO1:Able to understand fundamentals concepts of core information system & information assurance (IA)
principles.
CO2: Able to gain insight into Cyber Security threats to Data & E-commerce, Security technologies and
basics of Public Key Cryptographic System.
CO3: Able to understand principles of development of Secure Information Systems.
CO4: Able to understand process of development of cyber security network architecture principles, publishing and
notification of Security Policies and evolving Security Technologies.
CO5: Able to understand various Information Security Standards and Cyber Laws of India.

SECTION-A
1. Attempt all parts. All parts carry equal marks. [2X5=10]
[a] Why storage policy is required? [CO2]
[b] Differentiate between Virus and worm.[CO2]
[c] Explain trapdoors. [CO2]
[d] What is spoofing? [CO2]
[e] Explain Trojan horse in short. [CO2]

SECTION-B
2. Attempt any FOUR questions from this section. [5X4=20]
[a] Why do we need backup of the data? Explain different data backup techniques.[CO2]
[b] What is digital Signature? Explain its security aspects. [CO2]
[c] Explain various method of data disposal.[CO2]
[d] What do you mean by Access Control? Explain different types of Access Control techniques.[CO2]
[e] What are different components of IDS? Explain different intrusion detection mechanisms used by IDS [CO2]
[f] Define VPN. Discuss various tunneling protocols.[CO2]

SECTION-C
3. Attempt any TWO questions from this section. [10X2=20]
[a] What is need of Public key-cryptography? Explain how it is different from Private Key Cryptography. [CO2]
[b] What do you understand by the term firewall? Explain the working of different types of firewall with suitable
diagrams. [CO2]
[c] Explain different means for E-payment and various security threats to E-Commerce in detail. [CO2]

You might also like