0% found this document useful (0 votes)
6 views2 pages

DBMS Model

The document outlines the B.Tech. degree model examination for the Data and Information Security course in November 2024, detailing the course outcomes and structure of the exam. It includes various parts with questions focusing on key concepts such as information security, legal and ethical issues, authentication schemes, and security practices. The examination consists of multiple sections, including short answer questions and detailed discussions on specific topics related to data security.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

DBMS Model

The document outlines the B.Tech. degree model examination for the Data and Information Security course in November 2024, detailing the course outcomes and structure of the exam. It includes various parts with questions focusing on key concepts such as information security, legal and ethical issues, authentication schemes, and security practices. The examination consists of multiple sections, including short answer questions and detailed discussions on specific topics related to data security.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

[Link].

DEGREE MODEL EXAMINATION ,NOV 2024


Semester: 05
Department Artificial Intelligence & Data Science
CW3551 - Data and information security
Time: 3 hrs. Maximum: 100 marks
(Answer All the Questions)
Course Outcomes (COs) for Assessment in this examination
CO1 Understand the basics of data and information security
CO2 Understand the legal, ethical and professional issues in information security
CO3 Understand the various authentication schemes to simulate different
applications
CO4 Understand various security practices and system security standards
CO5 Understand the web security protocals for E-commerce applications
CL-Cognitive Level; R-Remember; Un-Understand; Ap-Apply; An-Analyze; Ev-Evaluate;
Cr-Create
PART A (10 X 2 = 20 marks)

1. Define Information Security Un CO1


2. Explain the Steps in SDLC Un CO 1
3. Define Trojan Horse and Trap Door Un CO 2
4. What is Man in Middle attack Un CO 2
5. What is Digital Signature Un CO 3
6. Define Kerberos Un CO 3
7. What are the Services provided by PGP R CO 4
8. Sketch ESP packet Format Cr CO 4
9. Define SET Un CO 5
10. Define Dual Signature Un CO 5

PART B (5x13=65 marks)

11.a (i)Explain about NSTISSC Security Model.(7) Un CO 1


(ii)Explain about Top Down approach and Bottom Up
un CO 1
approach(6)
OR
11.b Discuss about the steps involved in SDLC Un CO 1
Explain Legal ,Ethical and Professional Issues in Information
12.a Un CO 2
Security
OR
12.b Discuss about Security Policy Un CO 2
13.a Explain briefly about Kerberos Un CO 3
OR
13.b Explain briefly about the Digital Signature Un CO 3
14.a Explain about IP Security and their modes Un CO4
OR
14.b Discuss about the Email Architecture Un CO4
15 a Describe SSL-SECURE SOCKET LAYER Un CO5
OR
15 b Define SET and explain the process of SET Un CO 5
PART C (1 X 15-15 marks)

16 a Explain X.509 Digital Certificate Un CO3


OR
16 b Explain the History of Information Security in Detail. Un CO 1

For Exam Cell Purpose

Remarks:

Scrutinized by

You might also like