CS507 Current Spring 2011 Final Term VU Paper [July 2011] Virtual University of Pakistan
Friday, July 15, 2011 Posted In .Final Term Exam Spring 2011 (July) Edit ThisMCQs = 40 for 40 Marks
Subjects= 13 for 40 Marks ( five for 2 marks , Five for 3 marks and three for 5 marks )
mcqs
Subjectives which i remember
1. Define Class? 2 marks
2. a)Define Ethics?
b) Code of ethics?
3. What is uses of DSS gives examples. 3 marks
Answer: There are three types of threats.
1-Physical threats: It refers to damage caused to the physical infrastructure of information
system. For example:
1-Fire
2-Water
3-Intrusion
4-Energy variation
5-Pollution
6-Structural damage
2-Logical Threat: It refers to damage caused to the information system without any physical
presence.
1-Worms and viruses
2-Logical intrusion
5. What you know about Malware? and what types of the Malware are there gives examples.. 5 marks
Sensors that are responsible for collecting data. The data can be in the form of network
packets, log files, system call, traces, etc. Analyzers that receive input from sensors and
determine intrusive activity An administrative console – it contains intrusion definitions applied
by the analyzers.A user interface
7. What are the basic components of DSS?
There are two major components
• DSS data base – is a collection of current and historical data from internal external sources. It
can be a massive data warehouse.
8. list down the components of IDS
Components of IDS
An IDS comprises on the following:
• Sensors that are responsible for collecting data. The data can be in the form of network packets,
log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration
9. Define intrusion detection 2 marks
An element to securing networks is an intrusion detection system (IDS). IDS is used in
complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies. It protects a company's information systems resources from external
as well as internal misuse
10. what is change management and what are its types? 5 marks
Types of change management:
1- Organizational Development:
2- Re-engineering
11. what is Access Controls , explain with a practical example? 3 marks
These controls establish the interface between the would-be user of the computer system and the
computer itself. These controls monitor the initial handshaking procedure of the user with the
operating system. For example when a customer enter the card and the pin code in an automatic
teller machine (ATM), the access controls are exercised by the system to block unwanted or
illegitimate access.
12. what are the intruders ?
13. Differentiate the following (Intrusion Detection vs Variance
Intrusion detection
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access. If audit trails have been designed and implemented to record appropriate information, they can assist in intrusion detection. Intrusion detection system can be made part of the regular security system to effectively detect intrusion. Real time intrusion detection is technical and complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily aimed at outsiders attempting to gain unauthorized access to the system.
Trends/variance-detection tools look for anomalies in user or system behavior. It is possible to
monitor usage trends and detect major variations. The log can be detected and analyzed to detect
the irregularity. For example, if a user typically logs in at 9 a.m., but appears at 4:30 a.m. one
morning, this may indicate either a security problem or a malfunctioning of the system clock,
that may need to be investigated. The log can be sorted/filtered for all log ins befor 9 a.m. from
that particular terminal
14. Differentiate between Objective & Scope of intrusion detection system. 3 marks