Questions Search

This website covers previous years question papers of various universities and colleges in India. Moreover, the information on admission to various courses from various universities/institutes/colleges are also available. Research paper questions are also updated from time to time. Also the latest teaching faculty plus teachers jobs, Government jobs, Banking Jobs, and other jobs are regularly updated to help jobless candidates. Admit cards of various recruitment of Govt organisation are updated. Search your terms using the search box provided.

Follow by Email

Saturday, August 13, 2016

2015 Question Papers BCA-604 Networking & System Security Uttarakhand Open University Question Papers

Uttarakhand Open University Question Paper
Roll No. ...........................
BCA-10 (Bachelor of Computer Application) 6th Semester Examination-2015
BCA-604 Networking & System Security
Time : 3 Hours Maximum Marks : 60
Note : This paper is of sixty (60) marks divided into three (03) sections A, B, and C.
 Attempt the questions contained in these sections according to the detailed instructions
given therein.
Section - A (Long Answer Type Questions)
Note : Section 'A' contains four (04) long-answer-type questions of fifteen (15) marks each.
Learners are required to answer any two (02) questions only. (2×15=30)
1. Describe in detail about IP security.
2. Discuss about the various network security issues in detail.
3. What is Network management security? Explain in detail.
4. What is firewall? Explain the various types of firewall in detail.
Section - B (Short Answer Type Questions)
Note : Section 'B' contains eight (08) short-answer-type questions of five (05) marks each.
Learners are required to answer any four (04) questions only. (4×5=20)
1. What is the difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)?
2. What is VPN? Explain.
3. Write about intruders and worms.
4. What is digital signature? Explain.
5. What are the key principles of the system security? Explain with example.
6. Write short notes on the following :
(i) Public Key Infrastructure
(ii) Data Hiding and Steganography
7. Distinguish between vulnerability and threat.
8. Discuss Biometric based authentication.
Section - C (Objective Type Questions)
Note : Section 'C' contains ten (10) objective-type questions of one (01) mark each.
All the questions of this section are compulsory. (10×1=10)
Select the correct option :
1. A digital signature is :
(A) Scanned signature
(B) Signature in binary form
(C) Encrypting information
(D) Handwritten signature
2. Mechanism to protect private networks from outside attack is :
(A) Firewall
(B) Antivirus
(C) Digital signature
(D) Formatting
3. Secret-key encryption is alsoknown as :
(A) Asymmetric encryption
(B) Symmetric encryption
(C) Private encryption
(D) None of the above
4. Kerberos is an encryption-based system that uses :
(A) Secret key encryption
(B) Public key encryption
(C) Private key encryption
(D) Data keyencryption
5. VPN:
(A) Reduce cost.
(B) Improve connectivity
(C) Maintain security
(D) All of the above
6. Another term for the network name in wireless network is :
(A) Security set identifier (SSID)
(B) Wire equivalent privacy (WEP)
(C) Wireless access point (WAP)
(D) None of the above
7. The components of IP security includes :
(A) Authentication Header (AH)
(B) Encapsulating Security Payload (ESP)
(C) Internet key Exchange (IKE)
(D) All of the above
8. AES stands for:
(A) Advanced Encryption standard
(B) Advanced Encryption System
(C) Advanced 'Encryption Suggestion
(D) None of the above
9. Authentication is:
(A) Verification of user's identification
(B) Verification of the data
(C) Both A and B
(D) None of the above
10. In network security:
(A) Data is protected during transmission
(B) Data is not protected during transmission
(C) Data is changed
(D) None of the above

No comments:

Post a Comment

Pen down your valuable important comments below