VUsolutions Transferred to AchiKhasi.com

From December 2011, this blog www.VUsolutions.blogspot.com is transferred to http://achikhasi.com/vu/ . So, you may visit http://achikhasi.com/vu/ for latest study related help.

Back to home VUsolutions

VUsolutions Fans Club [join us for MORE solutions]

VUsolutions on Facebook

CS507 Current Spring 2011 Final Term VU Paper [July 2011] Virtual University of Pakistan

Friday, July 15, 2011 Posted In Edit This
CS507 Current Spring 2011 Final Term VU Paper [July 2011] Virtual University of Pakistan

There were 53 Questions in All .... Total Marks: 80

MCQs = 40 for 40 Marks 
Subjects= 13 for 40 Marks ( five for 2 marks , Five for 3 marks and three for 5 marks )
mcqs


Subjectives which i remember

1. Define Class? 2 marks

2. a)Define Ethics?
b) Code of ethics?

3. What is uses of DSS gives examples. 3 marks

4. What are the types of threats ? 5 marks
Answer: There are three types of threats.
1-Physical threats: It refers to damage caused to the physical infrastructure of information
system. For example:
1-Fire
2-Water
3-Intrusion
4-Energy variation
5-Pollution
6-Structural damage
2-Logical Threat: It refers to damage caused to the information system without any physical
presence.
1-Worms and viruses
2-Logical intrusion

5. What you know about Malware? and what types of the Malware are there gives examples.. 5 marks

6. What are components of Intrusion detection system? 3 marks
Sensors that are responsible for collecting data. The data can be in the form of network
packets, log files, system call, traces, etc. Analyzers that receive input from sensors and
determine intrusive activity An administrative console – it contains intrusion definitions applied
by the analyzers.A user interface

7. What are the basic components of DSS?
There are two major components
• DSS data base – is a collection of current and historical data from internal external sources. It
can be a massive data warehouse.

8. list down the components of IDS
Components of IDS
An IDS comprises on the following:
• Sensors that are responsible for collecting data. The data can be in the form of network packets,
log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration

9. Define intrusion detection 2 marks
An element to securing networks is an intrusion detection system (IDS). IDS is used in
complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies. It protects a company's information systems resources from external
as well as internal misuse

10. what is change management and what are its types? 5 marks
Types of change management:
1- Organizational Development:
2- Re-engineering

11. what is Access Controls , explain with a practical example? 3 marks

Access Controls
These controls establish the interface between the would-be user of the computer system and the
computer itself. These controls monitor the initial handshaking procedure of the user with the
operating system. For example when a customer enter the card and the pin code in an automatic
teller machine (ATM), the access controls are exercised by the system to block unwanted or
illegitimate access.

12. what are the intruders ? 

13. 
Differentiate the following (Intrusion Detection vs Variance

Detection
Intrusion detection
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access. If audit trails have been designed and implemented to record appropriate information, they can assist in intrusion detection. Intrusion detection system can be made part of the regular security system to effectively detect intrusion. Real time intrusion detection is technical and complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily aimed at outsiders attempting to gain unauthorized access to the system.

Variance detection and audit trails
Trends/variance-detection tools look for anomalies in user or system behavior. It is possible to
monitor usage trends and detect major variations. The log can be detected and analyzed to detect
the irregularity. For example, if a user typically logs in at 9 a.m., but appears at 4:30 a.m. one
morning, this may indicate either a security problem or a malfunctioning of the system clock,
that may need to be investigated. The log can be sorted/filtered for all log ins befor 9 a.m. from
that particular terminal

14. Differentiate between Objective & Scope of intrusion detection system. 3 marks

Back to home VUsolutions

Shaadi.com: Just create ur account & find ur partner or EARN money, its reall & EASY

VUsolutions Followers (Join NOW and Get Extra Benefits)

Install LATEST toolbar having lot of features - GET solutions on Desktop

toolbar powered by Conduit
Caliplus 300x250 NoFlam VitoLiv 468x60 GlucoLo