Information Security exam paper-GUJARAT UNIVERSITY-DEPARTMENT OF COMPUTER SCIENCE ROLLWALA

Department of Computer Science
Rollwala Computer Centre
Gujarat University
M.Tech – I (Networking & Web Technology)
Sessional – II
Subject: Information Security Date: 21 /12 / 2012
Time: 1 hrs & 30 min Max. Marks: 40
Que: 1 Attempt the following: [20]
(A)What is time-of-check to time-of-use errors?
(B) What is the need of tagged architecture? Explain tagged architecture.
(C) The security kernel is responsible for what? Which is the most important
part of security kernel?
(D)What is the meaning of integrity of database elements? What action
Database management systems can take to correct errors?
(E) How can an attacker impersonate another person?
Que: 2 Attempt the following: [10]
(A)Give examples of trapdoors and causes of trapdoors.
(B) Explain the following file protection mechanism.
1) Persistent permission 2) Temporary
acquired
permission
OR
Que: 2 Attempt the following: (10)
(A)Explain
1) Memory resident
viruses
2) Boot sector
viruses
(B)Write Clark-Wilson commercial security policy.
Que: 3 Attempt any two. [10]
(A)State the types of covert channels. File lock channel is an example of
which type of covert channel?
(B) Give two phase update example and explain update technique.
(C) Describe the most common and useful port scanning methods.

Leave a Reply