IAT -1 - CW3551

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

P.S.V.

COLLEGEOFENGINEERINGANDTECHNOLOGY
(ApprovedbyAICTE,NewDelhiandAffiliatedtoAnnaUniversity,Chennai)
Accredited by NAAC with ‘A’ Grade
(Inclusion Under Section 2(f) & 12(B) of the UGC Act, 1956)
(AnISO9001:2015CertifiedInstitution)
Mittapalli, Balinayanapalli Post, Krishnagiri – 635 108

INTERNAL ASSESSMENT TEST- I


SUBJECT : CW3551/Data And Information Security SEM/DEPT : V/ AI&DS
DURATION :3 hours (10:00 AM-1:00 PM) TOTAL MARKS :100
Course Outcomes:

CO1 Understand the basics of data and information security

CO2 Understand the legal, ethical and professional issues in information security

CO3 Understand the various authentication schemes to simulate different applications.

ANSWER ALL THE QUESTIONS


Q.No. Questions Marks BTL CO
PART A (10*2=20 Marks)
1 Define the critical characteristics of information? 2 L1 CO1

2 Explain direct and indirect attacks? 2 L2 CO1

3 Discuss the Bottom up approach and top down approach? 2 L2 CO1

4 Define Vulnerability? 2 L1 CO1

5 What is Dehial of Service? 2 L2 CO2

6 What is Trojan horse? 2 L2 CO2

7 Define Active and Passive attack? 2 L1 CO2

8 What is Biometrics? 2 L2 CO3

9 Describe Digital signature? Types 2 L3 CO3

10 State the Authentication and its type? 2 L3 CO3

PART B (5*13=65 Marks)


a)Briefly about SDLC waterfall Methodology and it relation in respect to
information system?
11 Or 13 L1 CO1
b) i) What is NSTISCC Security model?
ii) Explain component of Information Security?
12 a) Discuss about the various critical characteristics that are possessed by 13 L2 CO1
information?

Or
b) i) Explain components of Information System?
ii) Explain Securing the Component?
a) Explain detailed about Access control matrix?
13 Or 13 L2 CO2
b) Detailed about Types of issues?
a) Describe the types of Computer Security?
14 Or 13 Ll CO2
b) List the computer security of Hybrid policies and explain?
a)State the Digital Signature scheme to their variants?
15 Or 13 L3 CO3
b) Explain the format of the -Kerberos -x-509 Directory Service?
PART C (1*15=15 Marks)

a) Assess the importance of infrastructure protection (assuring the


security of utility of services) and how that is related to the
16 enhancement of information security? 15 L3 CO3
OR
b) Formulate the for Hardware, Software and network
assetidentification.

CO Coverage:

CO Particulars Total marks


CO1 PART A - 4*2= 8 / PART B - 2*13=26 34

CO2 PART A - 3*2 =6 / PART B - 2*13=26 32


PART A - 3*2= 6/ PART B - 1*13=13 /
CO3 34
PART C - 1*15=15
TOTAL 100 Marks

COURSE OUTCOME WISE


BLOOMS LVEL WISE MARKS DISTRIBUTION
MARK DISTRIBUTION
35
34
32 32
33
32
31
36
CO1 CO2 CO3
L1 L2 L3

Course Instructor HoD Principal

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy