1(a)
For an online shopping system identify vulnerability, threat and attack.
5 M
1(b)
What is IP spoofing? How does it lead to Denial of service attack?
5 M
1(c)
What are the different modes of authenticating a user?
5 M
1(d)
What are the different phases of a virus? How does a virus propagate?
5 M
2(a)
Differentiate between
(i) Access control list and capability list
(ii) Firewall and IDS.
(i) Access control list and capability list
(ii) Firewall and IDS.
10 M
2(b)
Explain RSA algorithm for public key encryption. Given modulus N = 143 and public key = 7, find the values of p, q, phi (n), and private key d. Can we choose value of e=5? Justify.
10 M
3(a)
What is session hijacking? How does it occur? Give two ways to prevent a session hijack.
10 M
3(b)
How is single sign on achieved in Kerberos protocol? What is the concept of a ticket in this protocol?
10 M
4(a)
Compare the different types of firewalls that can be used to secure a network.
10 M
4(b)
List the different protocols of Ssl and explain the working in detail.
10 M
5(a)
What are the different appraoches to software reverse engineering?
10 M
5(b)
What are the file system vulnerabilities for a Linux system?
10 M
6(a)
Secure email
5 M
6(b)
Multi level access control
5 M
6(c)
Digital Right Management
5 M
6(d)
Non-maliciou programming errors
5 M
6(e)
Federated Identity Management
5 M
More question papers from System & Web Security