Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

23530 23530 23530 23530 23530 23530 23530 23530 23530

23530 Roll No.


23530 23530 23530 23530 23530 Total23530
No. of Pages
23530 : 02 23530

Total No. of Questions : 09

MCA (2015 & Onwards) (Sem.–3)


23530 23530 23530 23530 23530 23530 23530 23530 23530
INFORMATION SECURITY
Subject Code : MCA-302
Paper ID : [74074]
23530 23530 23530 23530 23530 23530 23530 23530 23530
Time : 3 Hrs. Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :
23530 23530
1. 23530
SECTIONS-A, B, C &23530
D contains 23530
T WO questions 23530each carrying
23530 T EN marks
23530 each 23530

and students has to attempt any ONE question from each SECTION.
2. SECTION-E is COMPULSORY consisting of T EN questions carrying T WENT Y
marks in all.
23530 23530
3. 23530 23530
Use of non-programmable 23530 calculator
scientific 23530
is allowed. 23530 23530 23530

SECTION-A
23530 23530

1.
23530 23530 23530

o m 23530 23530

What is cryptography? Discuss the authentication models used in cryptography.


23530 23530

23530
2.
23530
What are the various forms
23530 23530
.r c
of attacks? Explain their
23530
differences with
23530 23530
example. 23530 23530

p e SECTION-B
m
pa o
.r c
23530 3.
23530 What do you mean by
23530 Access Control?
23530 23530 Explain how
23530 access control
23530 matrix provides
23530 the 23530

br
security? What is meant by balancing Access and Security?

23530
4.
23530 23530
examples.
23530 23530 23530

p e
a) Differentiate between Password based and Token-based Authentication with suitable
23530 23530 23530

p a
23530 23530 23530 23530 23530
SECTION-C
r
b) Why and how to provide security to Database Management Systems?

b 23530 23530 23530 23530

5. What is Denial-of-Service (DoS) Attack? How to prevent from the DoS attacks?
23530 23530 23530 23530 23530 23530 23530 23530 23530

6. Illustrate the different types of Malicious Software (Malware).

23530 23530 23530 23530


SECTION-D
23530 23530 23530 23530 23530

7. What is Multilevel Security? Discuss ‘The Bell-La Padula Model’ for Computer Security.
How is it different from other Formal Models for Computer Security? Explain.
23530 23530 23530 23530 23530 23530 23530 23530 23530

1 | M-74074 (S6)-959

23530 23530 23530 23530 23530 23530 23530 23530 23530

23530 23530 23530 23530 23530 23530 23530 23530 23530


23530 23530 23530 23530 23530 23530 23530 23530 23530

8. What is Risk Management? State the methods for identifying and assessing Risk
23530 23530 23530 23530 23530 23530 23530 23530 23530
Management.

SECTION-E
23530 23530 23530 23530 23530 23530 23530 23530 23530
9. Write short notes on the following :

a) What is Information Security?


23530 23530 23530 23530 23530 23530 23530 23530 23530

b) What are various forms of Overflow Attacks?

23530 23530 c) What is Decryption?


23530 23530 23530 23530 23530 23530 23530

d) What is Intrusion Detection System?


23530 23530 23530 23530 23530 23530 23530 23530 23530
e) What is Windows Security?

f) State Email Spamming.


23530 23530 23530

g) What is Back door?


23530 23530

o m 23530 23530 23530 23530

23530 23530
h) State Security Maintenance.
23530 23530
.r c
23530 23530 23530 23530 23530

i) What is Cloud Security?


p e m
pa o
.r c
23530 23530 j) What is Spoofing?23530
23530 23530 23530 23530 23530 23530

23530 23530 23530


br 23530 23530

p e
23530 23530 23530 23530

p a
23530 23530 23530 23530 23530

br 23530 23530 23530 23530

23530 23530 23530 23530 23530 23530 23530 23530 23530

23530 23530 23530 23530 23530 23530 23530 23530 23530

23530 23530 23530 23530 23530 23530 23530 23530 23530

2 | M-74074 (S6)-959

23530 23530 23530 23530 23530 23530 23530 23530 23530

23530 23530 23530 23530 23530 23530 23530 23530 23530

You might also like