Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

JEPPIAAR ENGG COLLEGE DEPT OF CSE MODEL I EXAMINATIONS IT2042 ANSWER ALL INFORMATION SECURITY MAX MARKS :100

TIME:8.15 a.m -11.15 a.m DATE:22-01-2013

PART-A 1.What is information security? 2.What are the three components of C.I.A? 3.List the components used in security models? 4.what is a threat? 5.What is the difference between law & ethics? PART-B

5*2=10

15*6=90

1.Describe the critical characteristics of information?how are they used in the computer security? 2.Describe the system development life cycle-SDLC? 3.Explain the security system development life cycle-SecSDLC? 4.Discuss in detail the legal,Ethical &professional issues during security investigation? 5.Explain in detail about different types of threats? 6.Explain in detail the different types of cryptanaltics attacks?

JEPPIAAR ENGG COLLEGE DEPT OF CSE MODEL I EXAMINATIONS

CS2060

HIGH SPEED NETWORKS

ANSWER ALL

MAX MARKS :100 TIME:8.15 a.m -11.15 a.m DATE:21-01-2013

PART-A

5*2=10

1.What is Router? Explain the fuctins performed by Routers. 2.what are the different types of switch? 3.What are the functions performed by Internet layer? 4.What is the difference between circuit switched network and packet switched networks? 5.What are he different caregories of ATM services? PART-B 15*6=90

1. Write about the architecture, services and protocol layers of 802.11 2. Write brief notes on Fiber Channel 3. . Discuss in detail about ATM 4.Explain in detail about ETHERNET. 5. Discuss about the various features of queuing models 6. Explain the different congestion control mechanisms.

You might also like