Professional Documents
Culture Documents
IS (3rd) Dec2018
IS (3rd) Dec2018
INSTRUCTIONS TO CANDIDATES :
23530 23530
1. 23530
SECTIONS-A, B, C &23530
D contains 23530
T WO questions 23530each carrying
23530 T EN marks
23530 each 23530
and students has to attempt any ONE question from each SECTION.
2. SECTION-E is COMPULSORY consisting of T EN questions carrying T WENT Y
marks in all.
23530 23530
3. 23530 23530
Use of non-programmable 23530 calculator
scientific 23530
is allowed. 23530 23530 23530
SECTION-A
23530 23530
1.
23530 23530 23530
o m 23530 23530
23530
2.
23530
What are the various forms
23530 23530
.r c
of attacks? Explain their
23530
differences with
23530 23530
example. 23530 23530
p e SECTION-B
m
pa o
.r c
23530 3.
23530 What do you mean by
23530 Access Control?
23530 23530 Explain how
23530 access control
23530 matrix provides
23530 the 23530
br
security? What is meant by balancing Access and Security?
23530
4.
23530 23530
examples.
23530 23530 23530
p e
a) Differentiate between Password based and Token-based Authentication with suitable
23530 23530 23530
p a
23530 23530 23530 23530 23530
SECTION-C
r
b) Why and how to provide security to Database Management Systems?
5. What is Denial-of-Service (DoS) Attack? How to prevent from the DoS attacks?
23530 23530 23530 23530 23530 23530 23530 23530 23530
7. What is Multilevel Security? Discuss ‘The Bell-La Padula Model’ for Computer Security.
How is it different from other Formal Models for Computer Security? Explain.
23530 23530 23530 23530 23530 23530 23530 23530 23530
1 | M-74074 (S6)-959
8. What is Risk Management? State the methods for identifying and assessing Risk
23530 23530 23530 23530 23530 23530 23530 23530 23530
Management.
SECTION-E
23530 23530 23530 23530 23530 23530 23530 23530 23530
9. Write short notes on the following :
23530 23530
h) State Security Maintenance.
23530 23530
.r c
23530 23530 23530 23530 23530
p e
23530 23530 23530 23530
p a
23530 23530 23530 23530 23530
2 | M-74074 (S6)-959