APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY Previous Years Question Paper & Answer

Course : B.Tech

Semester : SEMESTER 8

Year : 2019

Term : MAY

Scheme : 2015 Full Time

Course Code : CS 472

Page:2





PDF Text (Beta):

13

14

15

16

17

18

19

a)
b)

a)

b)
a)
b)
a)
b)

a)
b)
a)
b)
a)
b)

H1066 Pages: 2

Interpret about the star property in Bell -LaPadula model.

Write Windows access control algorithm.

PART C
Answer any two full questions, each carries 9 marks.
How Buffer OverFlow (BOF) vulnerability makes software insecure. Explain
different ways in which BOF exploitations occur.
Explain XSS vulnerabilities.
Describe Kermack-McKendrick Model of worm propagation.
Explain any two categories of topological worms.
Explain how can you detect and prevent SQL Injection vulnerabilities.
Name any worm that exploited buffer overflow vulnerability. Explain its
characteristics.
PART 0
Answer any two full questions, each carries 12 marks.
Explain link level security provided by Bluetooth.
Describe entity authentication and key agreement in GSM Networks.
How security is implemented in online credit card payment systems?
What are the main concerns involved in online credit card payment systems?
Explain MAC generation and encryption in CCMP.

Explain any two technologies for web services.

Page 2of 2

(4)
(5)

(5)

(4)
(5)
(4)
(5)
(4)

(6)
(6)
(8)
(4)
(6)
(6)

Similar Question Papers