Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

More Academy

SECURITY IN
COMPUTING
SEM VI

ADDRESS TO VISIT :
607A, 6TH FLOOR, ECSTASY BUSINESS PARK,
CITY OF JOY, JSD ROAD, MULUND (W)
8591065589/022-25600622
www.moreacademy.online
More Academy

Year April 2019


[Total Marks: 75]

1. Attempt any three of the following: 15


a. What are the importance of information protection? Explain with example.
b. Explain various components used to build a security program.
c. What are the three recognized variants of malicious mobile code? Explain.
d. Write a short note on Network-Layer Attack.
e. Explain the two most common approaches of security.
f. Explain the best practices for network defence.

2. Attempt any three of the following: 15


a. Define authentication. Explain two parts of authentication.
b. Explain the authorization systems.
c. Explain public key Cryptography.
d. What are the three primary categories of storage infrastructure in modern storage
security? Discuss.
e. Write a short note on integrity risks.
f. Explain Database-Level Security.

3. Attempt any three of the following: 15


a. Explain the Cisco Hierarchical Internetworking model.
b. Explain network availability and security.
c. Write a short note on hubs and switches.
d. Explain the features of firewall.
e. Explain the five different types of wireless attacks.
f. What are the countermeasures against the possible abuse of wireless LAN?

YouTube - Abhay More | Telegram - abhay_more


607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
More Academy

Year April 2019


[Total Marks: 75]

4. Attempt any three of the following: 15


a. Explain intrusion Defense System types and detection models.
b. Write a short note on Security Information and Event Management.
c. What are components of Voice Over IP? Explain.
d. Write a short note on Private Bank Exchange.
e. Explain different classic security models.
f. Write a short note on trustworthy computing.

5. Attempt any three of the following: 15


a. Define virtual machine. How is hypervisor responsible for managing all guest OS
installations on a VM server?
b. What is cloud computing? Explain the types of cloud services.
c. Explain the application security practices and decisions that appear in most secure
development lifecycle.
d. Explain the reasons for remote administration security.What are advantages of web
remote administration?
e. Explain the security considerations for choosing a secure site location.
f. Explain the different factors for securing the assets with physical security devices.

YouTube - Abhay More | Telegram - abhay_more


607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
More Academy

Year November 2019


[Total Marks: 75]

1. Attempt any three of the following: 15


a. Explain three D’s of security.
b. Explain the statement that “Achieving 100 percent protection against all conceivable
attacks is an impossible job”
c. Write a note on Threat Vector.
d. What are Application layer attacks? Explain following Application layer attacks:
i. Buffer overflows
ii. Password cracking
e. Explain the Onion Model.
f. List and explain the steps to create a Security Defense Plan.

2. Attempt any three of the following: 15


a. Explain certificate-based authentication in detail.
b. Write a note on Role-based Authorization (RBAC).
c. Write a note on symmetric key cryptography.
d. Explain any two confidentiality risks.
e. Write a note on object-level security.
f. Explain different types of database backups.

3. Attempt any three of the following: 15


a. Write a note on outbound filtering.
b. Explain the role of hubs and switches in network.
c. Explain in detail Network Address Translation (NAT).
d. Explain strengths and weaknesses of a firewall.
e. Explain the importance of antenna choice and positioning.
f. Explain any two types of wireless attacks.

YouTube - Abhay More | Telegram - abhay_more


607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622
More Academy

Year November 2019


[Total Marks: 75]

4. Attempt any three of the following: 15


a. Explain network-based intrusion detection system in detail.
b. List and explain steps to a successful IPS Deployment plan.
c. Write a note on H.323 protocol that includes:
i. Governing Standard
ii. Purpose
iii. Function
iv. Known Compromises and Vulnerabilities
v. Recommendations
d. What is Private Branch Exchange (PBX)? How will you secure PBX?
e. Write a note on Access Control List (ACL).
f. Explain the reference monitor concept and windows security reference monitor.

5. Attempt any three of the following: 15


a. Explain how to protect the Guest OS, Virtual Storage and Virtual Networks in Virtual
machines.
b. State and explain types of cloud services.
c. Explain various Application Security Practices.
d. Write a note Custom Remote Administration.
e. Explain the classification of Corporate physical Assets.
f. Explain Locks and Entry Controls that should be considered while securing assets
with physical security devices.

YouTube - Abhay More | Telegram - abhay_more


607A, 6th floor, Ecstasy business park, city of joy, JSD road, mulund (W) | 8591065589/022-25600622

You might also like