Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

B. Tech.

: THIRD YEAR
ST-II Examination (ODD SEMESTER, 2019-20)
SEMESTER: V BRANCH: CSE & EEE SECTION:A, B, C
Subject Name: Cyber Security
Time: 2 Hours. Date of Examination: 01/10/2019 Max. Marks: 50
(Following Paper Code and Roll No. to be filled in your Answer Book)
PAPER CODE: RUC-501 Roll No.

Note: Do as Directed. Missing data if any may be suitably assumed and mentioned. Symbols have their
usual meaning.
CO1:Able to understand fundamentals concepts of core information system & information assurance (IA)
principles.
CO2: Able to gain insight into Cyber Security threats to Data & E-commerce, Security technologies and
basics of Public Key Cryptographic System.
CO3: Able to understand principles of development of Secure Information Systems.
CO4: Able to understand process of development of cyber security network architecture principles, publishing and
notification of Security Policies and evolving Security Technologies.
CO5: Able to understand various Information Security Standards and Cyber Laws of India.

SECTION-A
1. Attempt all parts. All parts carry equal marks. [2X5=10]
[a] Why storage policy is required? [CO2]
[b] Differentiate between Virus and worm.[CO2]
[c] Explain trapdoors. [CO2]
[d] What is spoofing? [CO2]
[e] Explain Trojan horse in short. [CO2]

SECTION-B
2. Attempt any FOUR questions from this section. [5X4=20]
[a] Why do we need backup of the data? Explain different data backup techniques.[CO2]
[b] What is digital Signature? Explain its security aspects. [CO2]
[c] Explain various method of data disposal.[CO2]
[d] What do you mean by Access Control? Explain different types of Access Control techniques.[CO2]
[e] What are different components of IDS? Explain different intrusion detection mechanisms used by IDS [CO2]
[f] Define VPN. Discuss various tunneling protocols.[CO2]

SECTION-C
3. Attempt any TWO questions from this section. [10X2=20]
[a] What is need of Public key-cryptography? Explain how it is different from Private Key Cryptography. [CO2]
[b] What do you understand by the term firewall? Explain the working of different types of firewall with suitable
diagrams. [CO2]
[c] Explain different means for E-payment and various security threats to E-Commerce in detail. [CO2]

You might also like