Exam Details
Subject | cyber security | |
Paper | ||
Exam / Course | m.tech | |
Department | ||
Organization | Institute Of Aeronautical Engineering | |
Position | ||
Exam Date | July, 2017 | |
City, State | telangana, hyderabad |
Question Paper
Hall Ticket No Question Paper Code: BCS006
INSTITUTE OF AERONAUTICAL ENGINEERING
(Autonomous)
M.Tech II Semester End Examinations (Regular) July, 2017
Regulation: IARE-R16
CYBER SECURITY
(Computer Science and Engineering)
Time: 3 Hours Max Marks: 70
Answer ONE Question from each Unit
All Questions Carry Equal Marks
All parts of the question must be answered in one place only
UNIT I
1. Explain in detail about various types of cyber crime and discuss briefly about Web Server.
Describe the architecture of Apache and IIS web servers, Database server and explain its functionality.
2. Explain briefly about computer forensics.
Discuss about different types of
i. Web languages
ii. Web security
iii. N-tier web applications.
UNIT II
3. Explain in brief about cryptography, its purpose and concept of virus.
Illustrate the application of RSA algorithm in real time with an example.
4. Explain about public key cryptography, its applications and using example.
Explain in brief about how intrusion detection systems are being implemented.
UNIT III
5. Explain the concept of working of an e-mail preservation and investigation in cyber crime.
Explain briefly about cyber crime investigation tools and their implementation.
6. Define firewall. And explain how the firewall can be applied to overcome the virus.
Describe how e-mail can be recovered. Explain the concept of e-mail preservation and investigation.
Page 1 of 2
UNIT IV
7. Explain briefly about the various applications of digital forensics.
Explain briefly about working model of
i. Linux system forensics
ii. Network forensics
8. Explain in detail about how forensics helps in face ,iris, fingerprint recognition, audio video
analysis.
What are the various advanced tools used for implementation forensics software and hardware
analysis? Briefly explain.
UNIT V
9. Assume you are developing a website of a software company. List all the JDBC APIs and JDBC
drivers used and explain how proxy design pattern is used to design secure JDBC driver. Also
explain how SSL tunneling is used in secure jdbc transmission.
List and explain all the sections of the electronic communication privacy act. Give example
situation where a criminal is let free due to the drawbacks in electronic communication privacy
act.
10. Explain the procedure of JDBC connectivity in real time application with an example.
What are the basics of Indian Evidence Act IPC and CrPC. Explain in detail.
INSTITUTE OF AERONAUTICAL ENGINEERING
(Autonomous)
M.Tech II Semester End Examinations (Regular) July, 2017
Regulation: IARE-R16
CYBER SECURITY
(Computer Science and Engineering)
Time: 3 Hours Max Marks: 70
Answer ONE Question from each Unit
All Questions Carry Equal Marks
All parts of the question must be answered in one place only
UNIT I
1. Explain in detail about various types of cyber crime and discuss briefly about Web Server.
Describe the architecture of Apache and IIS web servers, Database server and explain its functionality.
2. Explain briefly about computer forensics.
Discuss about different types of
i. Web languages
ii. Web security
iii. N-tier web applications.
UNIT II
3. Explain in brief about cryptography, its purpose and concept of virus.
Illustrate the application of RSA algorithm in real time with an example.
4. Explain about public key cryptography, its applications and using example.
Explain in brief about how intrusion detection systems are being implemented.
UNIT III
5. Explain the concept of working of an e-mail preservation and investigation in cyber crime.
Explain briefly about cyber crime investigation tools and their implementation.
6. Define firewall. And explain how the firewall can be applied to overcome the virus.
Describe how e-mail can be recovered. Explain the concept of e-mail preservation and investigation.
Page 1 of 2
UNIT IV
7. Explain briefly about the various applications of digital forensics.
Explain briefly about working model of
i. Linux system forensics
ii. Network forensics
8. Explain in detail about how forensics helps in face ,iris, fingerprint recognition, audio video
analysis.
What are the various advanced tools used for implementation forensics software and hardware
analysis? Briefly explain.
UNIT V
9. Assume you are developing a website of a software company. List all the JDBC APIs and JDBC
drivers used and explain how proxy design pattern is used to design secure JDBC driver. Also
explain how SSL tunneling is used in secure jdbc transmission.
List and explain all the sections of the electronic communication privacy act. Give example
situation where a criminal is let free due to the drawbacks in electronic communication privacy
act.
10. Explain the procedure of JDBC connectivity in real time application with an example.
What are the basics of Indian Evidence Act IPC and CrPC. Explain in detail.
Other Question Papers
Subjects
- ac to dc converters
- advanced cad
- advanced concrete technology
- advanced data structures
- advanced database management system
- advanced mechanics of solids
- advanced reinforced concrete design
- advanced solid mechanics
- advanced steel design
- advanced structural analysis
- advanced web technologies
- big data analytics
- computer aided manufacturing
- computer aided process planning
- computer architecture
- computer oriented numerical methods
- cyber security
- data science
- data structures and problem solving
- dc to ac converters
- design for manufacturing and assembly
- design for manufacturing mems and micro systems
- design of hydraulic and pneumatic system
- distributed operated system
- earthquake resistant design of buildings
- embedded c
- embedded networking
- embedded real time operating systems
- embedded system architecture
- embedded system design
- embedded wireless sensor networks
- english for research paper writing
- finite element method
- flexible ac transmission systems
- flexible manufacturing system
- foundations of data science
- foundations of data sciences
- fpga architecture and applications
- hardware and software co-design
- high performance architecture
- intelligent controllers
- internet of things
- introduction to aerospace engineering
- mathematical foundation of computer
- mathematical methods in engineering
- matrix methods of structural analysis
- micro controllers and programmable digital signal processing
- multilevel inverters
- numerical method for partial differential equations
- power electronic control of ac drives
- power electronic control of dc drives
- power quality
- precision engineering
- principles of distributed embedded systems
- programmable logic controllers and their applications
- rapid prototype technologies
- rehabilitation and retrofitting of structures
- renewable energy systems
- research methodology
- soft computing
- special machines and their controllers
- stress analysis and vibration
- structural dynamics
- structural health monitoring
- theory of elasticity and plasticity
- theory of thin plates and shells
- web intelligent and algorithm
- wireless lan’s and pan’s
- wireless lans and pans
- wireless sensor networks