TYBSC-IT - SEM6 - SIC - APR19 Munotes Mumbai University
TYBSC-IT - SEM6 - SIC - APR19 Munotes Mumbai University
TYBSC-IT - SEM6 - SIC - APR19 Munotes Mumbai University
(2½ Hours)
[Total Marks: 75]
n
a. What are the importance of information protection? Explain with example.
b. Explain various components used to build a security program.
i
c. What are the three recognized variants of malicious mobile code? Explain.
.s
d. Write a short note on Network-Layer Attack.
e. Explain the two most common approaches of security.
f. Explain the best practices for network defence.
e
2. Attempt any three of the following: 15
a. Define authentication. Explain two parts of authentication.
t
b. Explain the authorization systems.
c. Explain public key Cryptography.
o
d. What are the three primary categories of storage infrastructure in modern storage security?
Discuss.
e. Write a short note on integrity risks.
n
f. Explain Database-Level Security.
u
3. Attempt any three of the following: 15
a. Explain the Cisco Hierarchical Internetworking model.
b. Explain network availability and security.
c. Write a short note on hubs and switches.
m
d. Explain the features of firewall.
e. Explain the five different types of wireless attacks.
f. What are the countermeasures against the possible abuse of wireless LAN?
68320 Page 1 of 1
52D665BA610210D6637CEC2F49F4CEE3