Quick Links
University Papers | University Syllabus | Entrance Exam |
PSU Papers | Bank Papers | Placement Papers |
VTU | Anna Univerity Syllabus | Anna Univerity Papers |
Question Paper Code : 21293
B.E./B.TECH. DEGREE EXAMINATION , MAY/JUNE 2013
Eighth Semester
Computer Science and Engineering
IT 2042 / IT 706 – INFORMATION SECURITY
(Common to Seventh Semester Information Technology)
(Regulation 2008)
University Papers | Syllabus | Entrance Exam | Govt & PSU Papers | Bank Papers
Programming Questions | Travel Tips | Mobile Review | Placement Papers
ANNA UNIVERSITY SYLLABUS: CLICK HERE
ANNA UNIVERSITY PAPERS: CLICK HERE
Download PDF File - Click Here
PART A – (10 X 2 = 20 marks)
1. Define information security.
2. List the critical characteristics of information.
3. What is intellectual property?
4. What is a policy? How is it different from a law?
5. Why do we have to do periodic reviews in managing risks?
6. Give the meaning of “dumpster diving” with respect to information security.
7. Define policy and standards.
8. Give any five major sections of ISO/IEC 17799 standard.
9. What is content filter?
10.List any four physical security controls.
PART B – (5 X 16 = 80marks)
11. (a) List and explain the various components of an information system.
(Or)
(b) Explain the components of System Development Life Cycle (SDLC) with neat sketch.
12. (a) What is the difference between attack and vulnerability? List and explain any seven attacks.
(Or)
(b) List and discuss about the role and focus of any four professional organizations in providing information security.
13. (a) Sketch and explain the components of risk identification process.
(Or)
(b) (i) Brief about the data classification and management process. (8)
(ii) List and explain the different types of access control. (8)
14. (a) (i) Brief about the elements of an Issue-Specific Security Policy Statement. (8)
(ii) Brief about any Four Significant points of the NIST SP 800-14 Security model. (8)
(Or)
(b) Explain the security architecture design process with neat sketch.
15. (a) Explain the different types of Intrusion Detection System (IDS) with their advantages and dis advantages.
(Or)
(b) (i) Brief about the various cryptography tools. (8)
(ii) List and describe the credentials of the various information security certifications. (8)
0 Comments