FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU M.Tech. CSE 2nd Semester 76058 SECURE SOFTWARE DESIGN and ENTERPRISE COMPUTING Question Paper

Download PTU. I.K. Gujral Punjab Technical University (IKGPTU) M.Tech. CSE 2nd Semester 76058 SECURE SOFTWARE DESIGN and ENTERPRISE COMPUTING Question Paper.

This post was last modified on 13 December 2019

PTU M.Tech 2nd Semester Last 10 Years 2010-2020 Previous Question Papers|| Punjab Technical University


FirstRanker's choice FirstRanker.com

Roll No.

Total No. of Pages : 01

--- Content provided by‌ FirstRanker.com ---

Total No. of Questions : 08

M.Tech. (CSE Engg.) (2018 Batch) (Sem.-2)

SECURE SOFTWARE DESIGN & ENTERPRISE COMPUTING

Subject Code : MTCS-207-18

M.Code: 76058

--- Content provided by​ FirstRanker.com ---

Time: 3 Hrs.

Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :

  1. Attempt any FIVE questions out of EIGHT questions.
  2. Each question carries TWELVE marks.
  3. --- Content provided by‌ FirstRanker.com ---

    1. What are software vulnerabilities? How they are identified?
    2. Give the Overview on Security concepts like Confidentiality, Integrity and Availability.
  1. Write the need for Security Testing. Discuss the steps of performing security testing on software design.
  2. How would you design distributed N- tier software application? What are business and data tiers of an enterprise database system?
  3. --- Content provided by‌ FirstRanker.com ---

  4. Write the steps to implement a directory based server infrastructure in a heterogeneous system environment.
    1. What is DNS in networking and how it works?
    2. How would you manage and secure a cluster in network services?
  5. Explain the steps to manage and troubleshoot a network running multiple services.
  6. --- Content provided by FirstRanker.com ---

  7. What are web applications attacks? How to defend web and mobile applications against attackers?
  8. What is SQL Injection attack? How to prevent it? Illustrate with example.

NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: PTU M.Tech 2nd Semester Last 10 Years 2010-2020 Previous Question Papers|| Punjab Technical University