Computer Security and Cyber Law – BIM (TU) Question Paper 2014 | 8th SEM

Download our Android App from Google Play Store and start reading Reference Notes Offline.

Computer SecurityTribhuvan University | Faculty of Management
BIM / Eight Semester / Year: 2014 (2071)
ITC 229: Computer Security and Cyber Law

Candidates are required to answer the questions in their own words as far as practicable.
Full Marks: 60 | Time: 3 hrs

Group “A” – 1. Brief Answer Questions: [10 X 1 = 10]

i. What is Originator Controlled Access?
ii. How does block cipher differ from stream cipher?
iii. Define the concept of trusted system.
iv. Define Arbitrated Digital Signature.
v. What is virtual machine monitor?
vi. What is Dual Signature?
vii. List any three general security rules.
viii. Define Electronic contracts.
ix. Differentiate between Passive attack and active attack.
x. What is Principle of Fail-Safe Defaults?

Group “B” – Short Answer Questions: [6 X 5 = 30]

2. Define Intellectual Property Right. How intellectual properties can be protected? Explain.
3. Define SET (Secure Electronic Transaction) and Discuss its payment process.
4. Define digital forensics. List the difference between digital forensics and computer security.
5. In most of the cases computer virus are harmful to computer system but in some case they are useful. Explain in brief how are they useful?
6. Does confidentiality lead to compromise in integrity? Given your point of view.
7. Describe each of the following IT security terms in short:
a. Human Issues
b. Firewall

Group “C” – Long Answer Question: [2 X 10 = 20]

8. Define Intrusion Detection System. Explain how the system can be protected once and intrusion is detected.
9. How the security that is chosen by user can be improved? Explain.

Posted By : MeroSpark | Comment RSS | Category : Bachelor Level, Tribhuvan University
Tag :

Post a Comment

Your email is never published nor shared. Required fields are marked *