Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Printed Pages:2 Sub Code:KNC301

Paper Id: 233075 Roll No.

B.TECH.
(SEM III) THEORY EXAMINATION 2022-23
COMPUTER SYSTEM SECURITY
Time: 3 Hours Total Marks: 50
Note:
1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A

1. Attempt all questions in brief. 1 x 10 = 10


Qno. Question

a. What is computer security? Discuss confidentiality and integrity.


b. What is Ransomware?

2
90

13
c. What is the use of frame busting in web security?
_2

2.
d. Differentiate between encryption and decryption in cryptography.
P2

24
e. Discuss software fault isolation.

5.
3D

.5
f. What is use of kernel in Unix operating system?
P2

g. Define hash function. What is the use of hash function? 17


Q

|1
h. What is the main difference between virus and worm?
4

i. What is SQL injection attack ? Explain in brief.


:1
31

j. What is difference between Cache Memory and RAM ?


:
13

SECTION B
3

2. Attempt any three of the following: 5x3=15


02

a. What is control hijacking? Discuss the various types of hijacking attacks in detail.
-2
03

b. What is system call interposition? Explain ptrace and systrace in detail.


1-

c. Discuss browser isolation and remote browser isolation in detail.


|2

d. Explain RSA algorithm with the help of suitably chosen example.


e. What is an Intrusion Detection System (IDS)? Discuss the various approaches
adopted in developing IDS system.

QP23DP2_290 | 21-03-2023 13:31:14 | 117.55.242.132


Downloaded From Uptu-Khabar
SECTION C
3. Attempt any one part of the following: 5x1=5
a. Describe various types of security threats in detail.
b. Explain the different types of defenses used against control hijacking.
4. Attempt any one part of the following: 5x1=5
a. Define confinement principle. Discuss the approaches of confinement at different
levels.
b. What are Rootkits? Discuss the various types of Rootkits in detail.
5. Attempt any one part of the following: 5x1=5
a. What is cross site request forgery? Explain the concept with suaitable examples.
b. Discuss the defenses and protection against cross site scripting.
6. Attempt any one part of the following: 5x1=5

2
90
a. Describe Symmetric key and Asymmetric key Cryptography eith due emphasis

13
_2

on the difference between them.

2.
P2

24
b. What is digital signature? Discuss the various steps used in creating digital
signature.

5.
3D

.5
P2

7. Attempt any one part of the following: 5x1=5 17


Q

|1
a. What is firewall? Explain packet filtering firewall in detail.
4

b. Write short note on the following:


:1
31

(i) DNS security


:

(ii) Routing security


13
3
02
-2
03
1-
|2

QP23DP2_290
Downloaded From Uptu-Khabar| 21-03-2023 13:31:14 | 117.55.242.132

You might also like