Saturday, August 13, 2016

2015 Question Papers BCA-604 Networking & System Security Uttarakhand Open University Question Papers

Uttarakhand Open University Question Paper
Roll No. ...........................
BCA-10 (Bachelor of Computer Application) 6th Semester Examination-2015
BCA-604 Networking & System Security
Time : 3 Hours Maximum Marks : 60
Note : This paper is of sixty (60) marks divided into three (03) sections A, B, and C.
 Attempt the questions contained in these sections according to the detailed instructions
given therein.
Section - A (Long Answer Type Questions)
Note : Section 'A' contains four (04) long-answer-type questions of fifteen (15) marks each.
Learners are required to answer any two (02) questions only. (2×15=30)
1. Describe in detail about IP security.
2. Discuss about the various network security issues in detail.
3. What is Network management security? Explain in detail.
4. What is firewall? Explain the various types of firewall in detail.
Section - B (Short Answer Type Questions)
Note : Section 'B' contains eight (08) short-answer-type questions of five (05) marks each.
Learners are required to answer any four (04) questions only. (4×5=20)
1. What is the difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)?
2. What is VPN? Explain.
3. Write about intruders and worms.
4. What is digital signature? Explain.
5. What are the key principles of the system security? Explain with example.
6. Write short notes on the following :
(i) Public Key Infrastructure
(ii) Data Hiding and Steganography
7. Distinguish between vulnerability and threat.
8. Discuss Biometric based authentication.
Section - C (Objective Type Questions)
Note : Section 'C' contains ten (10) objective-type questions of one (01) mark each.
All the questions of this section are compulsory. (10×1=10)
Select the correct option :
1. A digital signature is :
(A) Scanned signature
(B) Signature in binary form
(C) Encrypting information
(D) Handwritten signature
2. Mechanism to protect private networks from outside attack is :
(A) Firewall
(B) Antivirus
(C) Digital signature
(D) Formatting
3. Secret-key encryption is alsoknown as :
(A) Asymmetric encryption
(B) Symmetric encryption
(C) Private encryption
(D) None of the above
4. Kerberos is an encryption-based system that uses :
(A) Secret key encryption
(B) Public key encryption
(C) Private key encryption
(D) Data keyencryption
5. VPN:
(A) Reduce cost.
(B) Improve connectivity
(C) Maintain security
(D) All of the above
6. Another term for the network name in wireless network is :
(A) Security set identifier (SSID)
(B) Wire equivalent privacy (WEP)
(C) Wireless access point (WAP)
(D) None of the above
7. The components of IP security includes :
(A) Authentication Header (AH)
(B) Encapsulating Security Payload (ESP)
(C) Internet key Exchange (IKE)
(D) All of the above
8. AES stands for:
(A) Advanced Encryption standard
(B) Advanced Encryption System
(C) Advanced 'Encryption Suggestion
(D) None of the above
9. Authentication is:
(A) Verification of user's identification
(B) Verification of the data
(C) Both A and B
(D) None of the above
10. In network security:
(A) Data is protected during transmission
(B) Data is not protected during transmission
(C) Data is changed
(D) None of the above
Share This
Previous Post
Next Post

B.E Civil Engineer Graduated from Government College of Engineering Tirunelveli in the year 2016. She has developed this website for the welfare of students community not only for students under Anna University Chennai, but for all universities located in India. That's why her website is named as www.IndianUniversityQuestionPapers.com . If you don't find any study materials that you are looking for, you may intimate her through contact page of this website to know her so that it will be useful for providing them as early as possible. You can also share your own study materials and it can be published in this website after verification and reviewing. Thank you!

0 comments:

Pen down your valuable important comments below

Search Everything Here