Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Transcript
Reg.No:
SNS College of Technology,Coimbatore-35.
(Autonomous)
B.E/B.Tech- Internal Assessment -II
Academic Year 2016-2017(Even)
Eighth Semester
Computer Science and Engineering
IT414 - Information Security
Time: 11/2 Hours
B
Maximum Marks: 50
Answer All Questions
PART - A (5 x 1 = 5 Marks)
1.
______ can best be defined as the sum of protection mechanisms inside the computer,
including hardware, firmware, and software.
a) Trusted system
c) Trusted computing base
2.
b) Security kernel
d) Security perimeter
______ is not a method to protect subjects, objects, and the data within the objects.
a) Layering
c) Abstraction
3.
4.
b) Data mining
d) Data hiding
______ computer recovery sites is only partially equipped.
a) Non-mobile hot site
b) Mobile hot site
c) Warm site
d) Cold site
The most extension type of disaster recovery testing is ______
a) Checklists
b) Full interruption
c) Simulation
5.
d) Parallel testing
The ISC2 code of Ethics is intended to ______
a) Help certificate holders in resolving b) Provide guidance on encouraging good
dilemmas related to their practice
behavior
c) Provide guidance on discouraging poor
d) All the above
behavior
1
PART - B (5 x 2 = 10 Marks)
6.
Differentiate between Functional Requirements and Assurance Requirements.
7.
Recall the Formal Security Testing Models.
8.
Represent the procedure to test a Disaster Recovery Planning.
9.
List the types of Computer Crimes.
10. Write any five commandments of computer ethics.
PART – C (14+14+7=35 Marks)
11. (a) Discuss about the Trusted Computing Base.
14
(or)
(b)
Explain the protection mechanism concepts and software process in 14
Trusted Computing Base.
12. (a) Explain the steps, importance and the scope involved when business and 14
security experts create a Business Continuity Plan.
(or)
(b) i) Point out the laws that address computer crime.
ii) Describe about Privacy and the Law.
13. (a) Explain in detail about the Security Architecture and Design.
6
8
7
(or)
(b) Analyze the Crimes committed by Cyber Criminals.
7
**********************
Prepared by
Verified by
2
HoD/DEAN