APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY Previous Years Question Paper & Answer

Course : B.Tech

Semester : SEMESTER 8

Year : 2019

Term : MAY

Scheme : 2015 Full Time

Course Code : CS 472

Page:1





PDF Text (Beta):

Reg No.:_

Max. Marks: 100

1

2

3

4

5

6

8

9

10

11 a)
b)
0)

12 ಖ
0)

111066 Pages: 2

Name:

APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
EIGHTH SEMESTER B.TECH DEGREE EXAMINATION, MAY 2019

Course Code: CS472
Course Name: PRINCIPLES OF INFORMATION SECURITY

PARTA
Answer all questions, each carries 4 marks.
What is brute force attack?
Discuss different types of attacks that can occur in an organization.
Describe discretionary policies for Biba model.
What is phishing? Give an example.

Differentiate between polymorphic and metamorphic worm.

How do you reduce the impact of XSS vulnerabilities?
Describe frame spoofing with a neat diagram.
Describe the security enhancements present in UMTS.
What is SOAP binding? Explain with the help of a HTTP message.
List the security threats in RFID based identification and tracking systems.
PART ‏تا‎
‎Answer any two full questions, each carries 9 marks.
What is role based access control. Illustrate with suitable example the concept
of role inheritance.
Differentiate between Discretionary and Role based access control.
Briefly discuss Mandatory access control implemented in a typical secure
operating system.
Demonstrate Chinese wall security model with neat diagram.
Classify each of the following as a violation of confidentiality, integrity,
availability or some combination thereof. Also justify your answer.
i. John copies Mary's homework.
ii. Paul crashes Linda's system
iii. Carol changes the amount of Angelo's check from 100 to 1000

iv. Gina forges Roger's signature on a deed.

Page lof 2

Duration: 3 Hours

Marks
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)
(4)

(4)

(2)
(3)

(5)
(4)

Similar Question Papers