0% found this document useful (0 votes)
24 views11 pages

Questions Papers

The document outlines the end semester examination details for a B.Tech course in Secured Computing at Kalasalingam Academy of Research and Education. It includes various questions related to cryptography, cybersecurity, cloud security, and networking, assessing students' understanding and application of these concepts. The examination consists of two parts, with a total of 100 marks and a duration of 180 minutes.

Uploaded by

stake939282
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
24 views11 pages

Questions Papers

The document outlines the end semester examination details for a B.Tech course in Secured Computing at Kalasalingam Academy of Research and Education. It includes various questions related to cryptography, cybersecurity, cloud security, and networking, assessing students' understanding and application of these concepts. The examination consists of two parts, with a total of 100 marks and a duration of 180 minutes.

Uploaded by

stake939282
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
— Laila’ re KABASALINGAM ACADEMY OF RE: 2latolalals ESEARCH : (Deemed to be University) AND EDUCATION Anand Nagar, Krishnankoil ~ 626 16, END SEMESTER EXAMINATIONS.£,- APR/MAY 2025 Course Code : z i : |212¢SE3305 Duration 180 Minutes , Course Name + | Secured Computing Max. Marks : | 100 ; Degree : | B.Tech. PART—A 20 Marks) Mapping Answer All Questions Pattern [NCOs | | Marks 1_ | List any two drawbacks in one-time pad cipher. Remember | coi | 2.0 2 |A monoalphabetic substitution cipher uses the following key: Apply | cor | 20 Plaintext alphabet: ABCDEFGHUKLMNOPQRSTUVWXYZ, Ciphertext alphabet: ZYXWVUTSRQPONMLKJIHGFEDCBA ‘You receive the ciphertext: "GLMV." Determine the plaintext. 3_| Explain bock cipher and stream cipher. Understand] C02 2.0 4 | Difference between public key and private key cryptosystem |Understand| co2 | 20 5 |A financial web application allows users tq log in,and transfer) Apply co3 | 20 funds between accounts. A developer fails io implement proper input validation in the login form and transaction page. A hacker inputs'OR 'I'='1_ in the usemame field and bypasses authentication to access anotlier user’s account, In the transaction form, the attacker enters 9999999999 as the transfer amount, causing: an integer overflow that allows unauthorized money transfers. What techniqies should the developer implement to prevent such attacks? ia i 6 | Auniversity professor finds an old USB drive and plugs it into Apply cO3 20 their office computer to access lecture notes: + The computer unexpectedly restarts, and upon reboot, it oe displays a "Missing Operating System" error. + The IT team investigates and discovers that the USB a: contained a boot sector virus, which modified the master = boot record (MBR), making the system unbootable. is + The virus had also attempted to spread to other computers z when the USB was inserted into different systems. What ! type of malware infected the professor’s computer, and 1 how does it work? g e 7 | company's outdated software contains known security flaws | Understand 20 that hackers exploit to gain unauthorized access. classify how this attack can be categorized based on its preventable measures. : in cloud | Understand | Coa | 2.0 8 | Explain the concept of the shared responsibility mod security. “ Analyze | 9, | Analyze the security measures that can be used top cos | 20 | from phishing and spoofing. PART | Mapping. ygarks i AQ0 Marks Aver Atl Ouestiane | COs ia court? cos | 20 cybersecurit PART BON r [1 Angwer All Questia. Patiern | ‘Apply | COL | 16.00) | 0 HLA You are working . 8 cryplographer for a sei ring to send an cnerypled message to information recat te location, The messaze cows vital ii recnains sec 18 @ overt operation, and they want {o ensure A remains secure during transmission,” Bes peas {0 use the THI eipher for encryption and , and they choose rie as the ke fate reat the following 2x2 matrix as the key K=(6 24 | 112) The plaintext message is: "MEET" OR TLB | Bdith and Norman have decided to encrypt all oftheir messages | Analyze | CO} 16.0 through ‘Playfair cipher’. They select a keyword "Galois" to decrypt the message “COSEC means Communication A) ‘Sccurity." While Norman can encrypt and decrypt on his own, Edith asks for your help with the process. Help Edith to figure it out. 12.A | Perform SDES use the following: Apply coz | 160 plain text = 11000011 key =1010101101 PLO =3,5,1,7,9,2,6,4,8,10 P8=3,2,6,5,8,7.14 FyP=41232341 P4=4321 IP =1,3,8,7,64,5,2 S0= 0100 11 10 1110 01 00 0010 0111 1101 1110 s1=00 01 10 11 10 00 O1 Il 11 00 01 00 10 01 00 11 OR , 12.B | Determine the plaintext from the cipher text C-50 N=143,e=11 | Apply coz | 160 2 _| using RSA algorithm ‘and explain it 13.A |A hospital's patient record system was ae with ransomware, | Analyze | CO3 16.0 focking all files and demanding Paymer roc ' of) \sryptocurrency. Examine the type of nd ‘ing the hospital, ‘assess its impact on hospital ‘operations, an® recommend immediate response actions along ‘with preventive measures to avoid future attacks? OR eed PART — B (80 Marks) ; | Answer All Questions | —— os '13.B A hospital management system experienced a data | error where patient medical records were not updated cone? | Analyze | CO} | 16.0 across departments. This led to incorrect, medication || prescribed. Classify the causes, impact, and resolution strtepige for this error. Suggest measures to’ ensure Such errors dy yop occur in the future. i Mapping ygarks Cone Marl 14.A |MNC Corp., a growing e-commerce company, recently migrateg | 1 its operations to the cloud. However, they have eneounteca| Amz | CO4 er security challenges, including unauthorized access to customer |, potential data breactres, and suspicious activities detected in ‘their network. Asa cloud security expert, recommend and analyze the key security architecture components that MNC Corp should implement to secure their cloud environment. Provide real-world examples to support your recommendations, OR 14.B|GHI Corp. a multinational firm, expanded its operations by| Analyze | CO4 | 16.0 adopting cloud services. However, employees started using unapproved cloud applications, increasing security risks. ‘Additionally, many employees were unaware of the company’s security policies, leading to frequent phishing incidents. a) categorize the importance of cloud security policies and procedures in GHI Corp’s scenario. b) List three key elements that should be included in GHI Corp’s cloud security policy. 15.A | Examine the root causes of a data breach in a cloud-based CRM] Analyze | COS | 16.0 system resulting from misconfigured access cv trols. Assess the potential security weaknesses and propose effective measures to prevent similar incidents in the future. . OR, 15.B]A company experiences frequent cyberattacks| including| Analyze | COS | 16.0 unauthorized access attempts and malware infiltration. The IT : team suspects that their current security measures are * \) insufficient. Analyze how firewalls can help mitigate these threats, identify potential limitations, and recommend best practices for enhancing firewall effectiveness, Assessment Pattern as per Bloom’s Taxonomy: COs | Remember | Understand | Apply | Analyze | Pvaluate Create | Total cor 2.0 0 0 | 160 _ 0 0 36} co2 0 4.0 ot 0 0 0 36 Co3 0 0 a0 32.0 0 o | 36 co4 0 4.0 5 32.0 0 0 36 cos 2.0 0 5 340 0 0 36 Total 4 8 a 114 0 0 180 Sees = = » XK la rbelok le [set ALASALINGAM ACADEMY OF RESEARCH AND EDUCATION Weemed to be Univ pa _| Time : 180Minutes Degree: B.Tech. —__| Maximum : 100 Marks ——— (Answer ALL Questions of PART A and PART B) | Assessment Pattern as per Bloom's Taxonomy: a Remember [Understand Apply, ‘Analyze Evaluate Create Total ~~ 8 12 80 48 32 0 180 | PART—A (10 x2 =20 Marks) Pattern | Mapping | Marks COs 1. [Define Kleene closure. Remember | _COl 2.0 2. | Write the’ state transition table for the below Determi Understand | COI 2.0 Finite Automata 3.__| State pumping lemma for the regular expression Remember co2 2.0 4._| Prove that language A = {a°b" [n> 0} is not Regular Understand | CO2 2.0 5._| List out the different phases of compiler. Understand [C03 2.0 6. | Recognize the tokens present in the below code Understand | CO3 2.0 inta,b : 7._| Differentiate between top-down parsing and bottom-up parsing | Remember | CO4 20 8._| Eliminate left recursion in the below grammar Remember | CO4 2.0 E>E+T/T : TST/F : F>()/id 9. | Write the three address code for the following expression Understand [~ COS 20 (atb)*(c/d)- (ate) 10. | Define Peephole optimization Understand | COS 20 PART - B (5x 16= 80 Marks) Pattern | Mapping | Marks COs Ta | Write a the of equivalence of Non-deterministic Finite Apply COI 16.0 Automata (NFA) to Deterministic Finite Automat (DFA) Convert the following Non-deterministic Finite Automata (NFA) to Deterministic Finite automat (DFA) States: Input symbols | A B © > g0__| {gl a4} {a4 {q2, 43} gl = {a4} = [2 = = {42.93} 3 Final ‘|= ay - state) |__|fas 2 5 : Cf _ [oR] Tib | Diaw NPA with epsilon transitions for the given regular Apply COI language _|.p 4 g)*patp ta)" Gi) COOOL) H0)* Prove that the language 1 = {abe (n> 0, k is an inteper} is Apply coz | 16.0 two Languages is (La 12) = (1 = Ow lw “I 2 "ab") as the intersection of two simpler regulat la LI = (w | wends with “a") and 12 = {w| w starts with "b' Show that the family of regular languages is closed under intersectionoperation, Justify the same regular language is closed under union operation. for] 126 | Construct DFA for the following RE (alb)*ab (lb) ‘Analyze coz__| 160 Tie | Demonstrate the various steps involved in the compilation | Apply CO3 16.0 process and explain their respective functions with neat diagram? TOR] 1b | Mlustrate the different stages in the process of compilation ‘Analyze co 16.0 specifying thecontent of symbol table at each stage for the following input: a=d* (etf}- (fe) * 80 Ta | Construct predictive parsing table for the following grammar “Analyze CO4 16.0 (10 marks) s—-(W)/a L>L,S/S Show the actions of the parser for the input string “(a, (a, 2))” (6 marks) : {oR} Tab | (a) Construct the SER(I) & LALR(I) parsing table for the Evaluate Coa 16.0 given grammar (10 marks) S->Aa| bAc| de | bda Aod (b) Justify whether the grammar is LALR (1) but not SLR (1) with proper reasoning. (6 marks) Sa Say Ty 16.0, Convert the following piece of code into tinee Evaluate address codes, Construct basic blacks, flow graph: far the code written by you, forti= Oyi 15 goto L1 5S.d=a/b 1. 2. 3. COs | Remember | Understand Apply Analyze | Evaluate | Create | Total cor 2 2 32 o 2 e 26 Coz 2 2 16 16 0 0 36 C03 0 4 16 16 0 0 36 co4 4 0 0 16 16 0 36 COS 0 4 16 0 16 o 36 TOTAL 8 12 80 48 32 0 180, eaRE KALASALINGAM ACADEMY OF RESEARCH AND (Deemed to be University) K koil ~ 626 126. IATIONS, APRII mputer Networks | 1] Differentiate Cireuit-switehed networks and Packet-switched | Understand |" COT | 2.0 networks. 2.__| List the various transmission media used in networking. Remember | __ COI 2.0 |_3._| List out the functions of the Data Link Layer Remember | _cO2__ | 2.0 4. | Suppose two computers are connected by an Ethernet hub at | Understand co2 2.0 home. Is this a LAN, a MAN, or a WAN? 5._| State the function of IOMPv4 protocol. Remember | _CO3 a 6. | Identify the address class of the following IP addresses Apply co3 By (a) 200.58.20.165 (b) 128.167.23.20 7. | What would be preferable over other (TCP/UDP), Remember | CO4 20 (a) Streaming a live video over the internet TCP/UDP (b) Large file transfers TCP/UDP 8._| Identify the services provided by UDP. Remember | __CO4 2.0 List out the types of DNS servers supported by the network. Remember | __COS 2.0 10. | What is the difference between IMAP and POP? Understand |~_CO5 2.0 PART - B (5 x 16 = 80 Marks) Pattern Marples Marks )s Tia | Ilustrate the four important and essential types of physical | Understand |” COI 16.0 topology or network topology that helps to perform the device linking geographical. {OR} Tib | What are the layers of the ISO/OSI protocol stack? Briefly list out | Understand | COT 16.0 their functions. _ T2a | Sixteen-bit messages are transmitted using a Hamming code.| Apply Coz 160 How many check bits are needed to ensure that the receiver can detect and correct single-bit errors? Assuming an even parity show the bit pattem transmitted for the — message 1101001100110101. How the receiver does finds whether the |__| received code word has an error or not. | ea {OR} ' 12 | What is wireless communication? List out some wireless | Understand COD 16.0 technologies available. Compare the characteristics of the various wireless 802.11 standards : 13a |Mustrate the working principles of IPV4 addressing and also | Understand | CO3 160 |____L elaborate JPV6 address shorthand with an example. Jor] en a block of addresses be 136 is 190.100.0.0/16. The ISP needs to distribute these groups of customers as follows: up 1 has 64 customers cach needs 256 addresses, , i up 2 has 128 customers each needs 128 addresses. stom h needs 64 addresses and give the slash notation for each sub- able after these 5 of Congestion Control | Understand ‘two broad eategori sms? Briefly explain all the techniques. — OR) - 14b | Imagine a Go-Back-N protocol operating over a wireless network with a highly variable bit error rate (BER). The sender is transmitting data to a receiver located in a moving vehicle. The | wireless channel experiences frequent bursts of interference, | Teading to intermittent packet loss. The network's round-trip time | (RTT) Muctuates significantly, ranging from SOms to SOOms. The | sender has a fixed window size of 8 packets. Deseribe how the Go-Back-N protocol will behave when a burst of interference ll causes packets 3, 4, and 5 to be lost in transmission. Detail the sequence of events at both the sender and receiver. See anchitecture of WWW and describe the concepts of| Understand | COS | 16.0 hypertext and hypermedia Tnalyze | CO4 16.0 15a fOR] 756 | You have just joined a new compan ‘email client to send and receive emails using the company's email Server. What information do you need to include in the email header to ensure that your emails are delivered correctly? How does the Mail Transfer Agent (MTA) play a role in routing your ‘emails to the correct recipient? _ _ - yy and need to configure your | Analyze COs 16.0 ‘Assessment Summary: COs | Remember | Understand ‘Apply | Analyze [Evaluate | Create Total coi 2 34 a 0 0 36 co2 2 18 16 0 0 0 36 Cos 2 16 18 0 0 0 36] cos] 4 16 0 16 0 0 36 cos 2 18 0 16 0 0 36 TOTAL 12 102 34 32 0 0 180 oer {Deemed to he University) id Nagar, R EXAMINATIONS- Course Code 22 ja12 Imankoil - 626 126, i - APR/MAY 2025 TIO] ; (19 2 4 eee KALASALINGAM ACADEMY OF RESEARCH AND E) 213CSEA301 [Puration [180 Minutes Course Name Pattem and Anomaly Detection | Max. Marks : [100 Degree : | BoTeeh, Gs PART—A (20 Marks) a T atiern |Mapring |, Answer All Questions Pattern | COs. | Marks | 1 | Define False negative and True positive instance Remember | cor | 2.0 | 2 | List out the real time applications of Patter Recognition Remember | cor | 20 | 3._| What isthe null hypothesis in hypothesis testing? Understand | Co2 | 20 | 4 | Define a linear repression model. Remember | co2 | 20 5_| Mention the role of an activation function in a neural network? Understand] C3 | 2.0 | & | The EM algorithm is used to fita Gaussian Mixture Model (GMM). Tow | Undewuna cos | 20 docs the algorithm handle missing data? 7_| Why do we need Rejection Sampling? Understand | cos | 2.0 8 | In the context of Approximate Inference, how Markov Chain Monte Carlo Understand] Go4 1.0 ‘methods can be used to estimate the marginal likelihood in a probabilistic model. | 9. | What is the key difference between static pattem ‘recognition and sequential | Understand] COS 2.0 | Pattern recognition? | 10 | A chatbot needs to understand customer queries based on past Understand] cos | 20 | conversations. How can recurrent neural networks (RNNs) assist in this scenario? | PART —B (80 Marks) : ‘Mapping | yea Answer All Questions Pattern |'"COs | | Marks 11.A Fonstruct polynomial curve fitting for the points (2,-1), (5,3) (446)and1,1)| Apply | cor | 160 with cubic polynomial function. [p(x)= ag + ayx+agx2+ayx°] oR 11.B [In a college, you are developing a predictive model to classify students as] Apply | coi] 160 either "Pass" or "Fail" based on their exam scores. After testing the model on a set of 200 students, the confusion matrix is as follows: [Predicted Pass [Predicted Fail [Actual Pass [120 0 tual Fail [25 Bs From the confusion matrix, calculate the following metrics: 1. Precision 2. Recall 3. Fl-Score 4. Accuracy ART 1 (80 Marks) | Mapping Ansaver AML Questions | COs” Marks at there isa relationship between ob 12.4. Prove dence using eli -squate test ved and expected values with Apply | Cor) too | 9986 i | - | | | FOiseved 2 3 4 5 6 | | | “3 | | | | a a | | | On | 1B | Alib -s an average of 4 book requests per hour. Assume the | Apply cor 16.0 umber of requests follows a Poisson distribution. What is the probability | | y will receive exactly 6 book requests in the next hour? | | bbook requests in the next hour? 1b, What is the probability that the library will receive greater {0 10 book requests in the next hour? equal | a, What is the probability that the library will receive greater than 10 | 13.A | A company analyzes customer spending behavior based on two attributes: Apply cos | 160 | total spending (in dollars) and number of visits per month, The dataset consists of the following 12 data points: P=((200,5),(220,6),(250,8) (4000, 1),(270,7),(230,5),(260,6),(4200,1), (280,8),(240,6) (5000,2),(290,9)} | Using Densi ing of Applications with Noise with | parameters 3, identify outliers in the dataset OR a 13.B | The champions trophy in 2025, is a competitive league between 8 teams. Apply co3 | 16.0 ‘The important match in the league is between india and Pakistan in dubai stadium, If there is a huge expectation that india will win in all the league matches. The following results are analyzed based on matches played by india in two different series. 4. LLLWLW 2. WWLLLW Find the series that maximize the expectations that india will win with an assumption probability of wins in series 1 is 0.7 and proability of wins in scrics 2 as 0.4. PART 1 (H0 Marks) rattern | EBPIPE start Answer All Question cos | 160 A 1. Find the exaet inference for the following query: P(Burplary [John Calls ~ True, Mary Calls » Tre) | Consider the given situation to calculate the posterior probability | s | oor Burglary Earthquake APU) APM) t=.90 t=.70 f=.01 OR TAB | Explain in detail about the various types of sampling techniques used for | Understand) CO 16.0 model inference with appropriate examples. TEA | Write Code to classify spoken words into predefined categories using HMM-| Apply | COS | 16.0 based model and evaluate its performance. OR, 75 ]A financial analyst wants to predict stock market tends based onhistorical | Apply | COS | 160 | price movements. Propose a hybrid model that combines machine learning ‘and deep learning for better accuracy. “Assessment Pattern as per Bloom’s Taxonomy: COs Remember Understand Apply | Analyze Evaluate | Create | Total cor 40 0 32.0 0 0 0 36 co2 2.0 2.0 32.0 0 0 0 36 cos | 0 40 32.0 0 0 0 36 cos 0 20.0 16.0 0 0 i 36 cos | 0 40 32.0 0 0 0 36 Total 6 30 144 0 0 0 180 eeeee

You might also like