(Statin Ki Forummnology : Paper I - Software Testing and Information Security.
Firstranker's choice FirstRanker.com
(Time: 3 hours) [Total Marks: 75]
--- Content provided by FirstRanker.com ---
Please check that you have got the correct question paper.
N. B.: (1) All questions are compulsory.
(2) Make suitable assumptions wherever necessary and state the assumptions made.
(3) Answers to the same question must be written together.
(4) Numbers to the right indicate marks.
--- Content provided by FirstRanker.com ---
(5) Draw neat labeled diagrams wherever necessary.
(6) Use of Non-programmable calculators is allowed.
SECTION -1
-
- Compare the following (7)
- Static testing & Dynamic testing
- Manual testing & Automated Testing
--- Content provided by FirstRanker.com ---
- Explain how to select appropriate testing tools. (6)
OR
- What are the objective of appointing a tool managers? List three steps used by the manager to manage the use of IT tools. (7)
- “Too little testing is a crime. Too much testing is sin.” Discuss (6)
--- Content provided by FirstRanker.com ---
- Compare the following (7)
-
- Write a short note on V- Concept of testing. (7)
- State & explain any four test factors in details (6)
OR
- Explain the program phase testing in detail. (7)
- List & explain the component of application fit. (6)
--- Content provided by FirstRanker.com ---
-
- Explain the testing process of Rapid Application Development (RAD). (6)
- With the help of the workbench explain the testing process of testing a client server system. (6)
OR
--- Content provided by FirstRanker.com ---
- Explain the PDCA strategy / concept used in software development process. (6)
- What are advantages and disadvantages of COTS? How will you test it? (6)
SECTION II
-
- List and explain different types of viruses. (7)
- With suitable example explain how we can provide user authentication. (6)
--- Content provided by FirstRanker.com ---
OR
- Explain the various types of computer criminals. (7)
- Explain the terms vulnerabilities, threats & controls with respect to internet security. (6)
-
- What are the attacks on passwords? Explain password selection criteria. (6)
- What is fragmentation and explain why fragmentation is used? (6)
OR
- What makes network vulnerable? Explain the architecture of network security control. (6)
- Explain different designs for multilevel secure database. (6)
--- Content provided by FirstRanker.com ---
-
- List & explain the characteristics of good security plan. (6)
- Write a short note on copyright, patent & trade secret. (6)
OR
- Explain the following in detail. (6)
- Session hijacking
- Man-in-middle Attack
--- Content provided by FirstRanker.com ---
- What is meant by contingency planning? What are the various measures to be taken after the crisis occur? (6)
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: OU B-Sc Last 10 Years 2010-2020 Question Papers || Osmania University