Sunday, December 13, 2015

University Of Pune Question Paper,2010 Question Paper,INFORMATION SECURITY,M. C. M. (Semester - IV)

University Of Pune Question Paper
M. C. M. (Semester - IV) Examination - 2010
INFORMATION SECURITY
(New 2008 Pattern)
Time : 3 Hours] [Max. Marks : 70
Instructions :
(1) Q. No. 6 is compulsory.
(2) Solve any one case from Q. No. 1.
(3) Solve any three questions from Q. Nos. 2 to 5.
(4) State your assumptions clearly.
Q.1) You are a Security Consultant of World Bank, a large International
Bank. The bank has purchased an old warehouse, internally it has a
secure facility. The location and its purpose is known only to a small
number of people who are employees of the bank. These persons have
signed a secrecy agreement in relation to the operations and locations
of the warehouse. As a part of your review of physical controls, you
examine adequacy of controls to prevent and detect fire. You notice
that there are no hand-held fire extinguishers kept at strategic locations
through out the room. After questioning Operations Manager, you find
that it is clear that they are familiar with the procedures and they are
practised regularly.
What is your conclusion about the adequacy of controls described
by the Operations Manager ? How will you proceed in terms of
investigation of the fire pevention and detection controls of the
warehouse ?
OR
Q.1) As more users are added in an interactive system, response time gets
longer. The Project Manager is perplexed that system can cope up
with many more users without noticeable response time. He cannot
determine whether the problem occurred is of hardware or software
based. He asks you to assist him to identify problem. During your
meeting with the Project Manager, you ask him to provide configuration
of hardware and software for the interactive system.
Identify system events that might be measured to determine, whether
the response time problems are software based or hardware based.
Explain type of measure you would undertake to trace, activate, duration
and so on. (State your assumptions, if any)
Q.2) Discuss basics of Information Security and its evolution.
Q.3) What are the threats in Infrastructure Security ?
Q.4) Discuss in brief the building block diagram of Information Security.
Q.5) Discuss SSE-CMM Model in detail.
Q.6) Write short notes : (Any Four)
(a) Firewall
(b) Security of E-mail System
(c) COBIT
(d) Role of Internet and www
(e) VPN
Share This
Previous Post
Next Post

B.E Civil Engineer Graduated from Government College of Engineering Tirunelveli in the year 2016. She has developed this website for the welfare of students community not only for students under Anna University Chennai, but for all universities located in India. That's why her website is named as www.IndianUniversityQuestionPapers.com . If you don't find any study materials that you are looking for, you may intimate her through contact page of this website to know her so that it will be useful for providing them as early as possible. You can also share your own study materials and it can be published in this website after verification and reviewing. Thank you!

0 comments:

Pen down your valuable important comments below

Search Everything Here