SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Similar documents
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

10EC832: NETWORK SECURITY

Diploma in Cyber Laws Examination, 2010 Paper I : BASIS AND REGULATORY FRAME WORK OF CYBER WORLD

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

HP Instant Support Enterprise Edition (ISEE) Security overview

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

A policy that the user agrees to follow before being allowed to access a network.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Syllabus: The syllabus is broadly structured as follows:

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Computer Visions Course Outline

Distributed Systems. Lecture 14: Security. 5 March,

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

E-Commerce/Web Security

CPET 581 E-Commerce & Business Technologies. References

University of Mumbai Institute of Distance and Open Learning

Windows 7, Enterprise Desktop Support Technician

Systems Analysis and Design in a Changing World, Fourth Edition

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

Table of Contents (CISSP 2012 Edition)

Most Common Security Threats (cont.)

All-in one security for large and medium-sized businesses.

Information and Network Security UNIT-I PLANNING FOR SECURITY

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Information Security Training Needs Assessment Study. Dr. Melissa Dark CERIAS Assistant Professor Continuing Education Director

CIH

Windows Client, Enterprise Desktop Support Technician

Computer networks 2013

The Internet, Intranets, and Extranets Chapter 7


CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

Ethical Hacking and Prevention

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

POST GRADUATE DIPLOMA IN CYBER SECURITY (PGDCS)

Technology Competence Initiative

Potential Threats to Mobile Network Security

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Security+ SY0-501 Study Guide Table of Contents

Securing Information Systems

Networks and Communications MS216 - Course Outline -

Application of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering

4) Discuss on various types of software myths and the true aspects of these myths.

IT ACCEPTABLE USE POLICY

CompTIA i-net+ Certification Exam Objectives (

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices.

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur

Future-ready security for small and mid-size enterprises

M.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75

Concepts, Technology, and Applications of Mobile Commerce

Servers for e-commerce Operational platforms eg: Web Servers, Application Servers etc. Performance planning and Monitoring Virtualisation

Computers and Security

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Bill Wear. VirtualVault Product Manager. Internet Banking Case Study

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Chapter 6: Security of higher layers. (network security)

NETWORK THREATS DEMAN

VALLIAMMAI ENGINEERING COLLEGE

19.1. Security must consider external environment of the system, and protect it from:

Certified Ethical Hacker (CEH)

CompTIA Security+ Certification

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Network Security and Cryptography. 2 September Marking Scheme

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Index. Cabinet of Egypt Information and Decision

QUESTION BANK UNIT-I

Contents. Introduction... xvii

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

Web insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.

Secure Web Transactions. Sridhar Iyer K R School of Information Technology IIT Bombay

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes


INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

CIS 700/002 : Special Topics : Protection Mechanisms & Secure Design Principles

Management Information Systems. B15. Managing Information Resources and IT Security

Security Assessment Checklist

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

CSCE 813 Internet Security Final Exam Preview

Chapter 7 Doing Business on the Internet

Transcription:

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK 2017-18 Course / Branch : M.Sc.(CST) Semester / Year : VIII / IV Subject Name : E - Commerce Subject Code : CTC8C Faculty Name : T. Prabakar Designation : Asst. Professor UNIT I Part A 1.1 Define E-Commerce. Apr 12, Nov 12, Apr 13, Apr 16 1.2 Define Internet. Apr 13 1.3 What is electronic business? Apr 14 1.4 What is the one difference between EDI and electronic commerce? Apr 14 1.5 What is virtual enterprise? Apr 14 1.6 List out some Internet service providers. 1.7 What are the components of E-commerce applications?, Apr 17 1.8 Illustrate the issues available in cryptography. Nov 15 1.9 What are the drawbacks of Intranet? Nov 15 1.10 Illustrate the advantages and disadvantages of e-cash. Nov 15 1.11 List out the issues to develop the e-commerce website. Nov 15 1.12 List out the benefits of business from e-commerce. Apr 16 1.13 Give the role of E-commerce. Nov 14 1.14 What is meant by digital signature? Nov 13, Nov 14 1.15 What is the role of independent third party in E-Commerce? Nov 13 1.16 What is Web Linking? Nov 13, Apr 17 1.17 Define Privacy Issues. Nov 13, Apr 17 1.18 Define WWW. Nov 12 1

Part B Q.No. Question Month & Year 1.19 Discuss about E-commerce applications. Apr 13 1.20 Explain about internet sales tax. Apr 14 1.21 How domain name disputes are resolved? Apr 14 1.22 Discuss in detail about the impact of e-commerce in business models. 1.23 Explain the role of www and Internet in e-commerce. Nov 15 1.24 Write about the four virtual spaces of ICDT business strategy model. Apr 16 1.25 Discuss the consulting practices and accounts independence. Apr 16 1.26 Explain about Electronic commerce security. Apr 12 1.27 Discuss the E-commerce architecture and its components with neat Nov 14 diagram. 1.28 Explain in detail about information overload. Nov 13 1.29 Write a note on ISP. Nov 12 1.30 What are the core principles of privacy protection identified by FTC? Explain. Apr 17 1.31 What is TRUSTE? What are its objectives? Apr 17 Part C 1.32 Discuss in detail about cryptography and privacy issues. Apr 13 1.33 Explain the implications for the accounting profession. Apr 14 1.34 Explain about web linking. Apr 14 1.35 Define E-commerce. Mention the categories of E-commerce business and their limitations. 1.36 How does E-commerce differ from traditional E-commerce? Explain it. 1.37 Explain education web enabled service with respect to time saving, efforts of the user, convenience and quality factors. Nov 15 1.38 Discuss the impact of Electronic Commerce on business model. Apr 16 1.39 Briefly explain the types of E-commerce with neat diagram. Nov 14 1.40 Explain in detail about electronic agreement and digital signature. Nov 13 1.41 Discuss about : Nov 12 2

(a) The role of independent third parties. (b) International libel laws. (c) Digital signature. 1.42 Discuss the various issues related to domain Name disputer. Apr 17 Unit II Part A 2.1 What is EDI? Or Define EDI. Nov 12, Apr 13 2.2 What are risks in insecure system? Apr 13 2.3 What is meant by Electronic commerce risk? Apr 14 2.4 What is Trojan horse? Apr 14 2.5 What is meant financial EDI?, Apr 16 2.6 Name some risks that involves in E-commerce., Apr 17 2.7 Write the impact of EDI Internet applications. Nov 15 2.8 What is the use of disaster recovery plan in E-commerce? Nov 15 2.9 What is authentication? Apr 16 2.10 Name the services provided by VAN. Apr 16 2.11 Write any two recovery plans for risks. Nov 12 2.12 Define Social Engineering. Apr 16 2.13 What is VAN? Apr 12 2.14 How domain name disputes are solved? Apr 12 2.15 What is e mail spoofing? Apr 12 2.16 What is virus? Or Define virus Apr 12, Nov 13, Apr 17 2.17 Write the advantages of EDI. Nov 14 2.18 Differentiate between Internet and Intranet. Nov 14 2.19 What are the characteristics of Internet based EDI? Nov 14 2.20 Define Intranet. Nov 13 3

Part B 2.21 Write a note on risk management paradigm. Apr 13 2.22 What are the risks associated with virus and malicious? Explain. Apr 14 2.23 Can a control risk become a weakness? How? Apr 14 2.24 Write short note on the risks associated with internet and intranet transactions. 2.25 What is EDI? Discuss its layered structure in detail? Nov 15 2.26 Explain about traditional EDI system. Apr 16 2.27 Discuss on "Control weakness Vs Control risks". Or Differentiate Control weakness and control Risks. Apr 12, Nov 12, Nov 13, Nov 14 2.28 What are the risks associated with Internet transactions? Apr 12 2.29 Write a note on Financial Edi-Edi Systems. Nov 12 2.30 What are the characteristic of good risk management controls? Apr 17 2.31 Explain the benefits of EDI-Internet systems. Apr 17 Part C 2.32 Explain in detail about EDI. Apr 13 2.33 What kinds of risk we have to fall in transactions? Explain. Apr 13 2.34 What is the functionality of antivirus programs? How are viruses detected and fixed? 2.35 Illustrate disaster recovery plan. Apr 16 2.36 Explain about financial EDI systems and the internet. Apr 12 2.37 Describe the working mechanism of EDI and discuss its types. Nov 14 2.38 What are the risks associated with internet transactions? Explain. Nov 13 2.39 Discuss about EDI Systems. Nov 12 2.40 What is an Extranet? How do Extranets differs from the internet? Explain. Apr 17 4

Unit III Part A 3.1 Write some of the security protocols. Apr 13 3.2 Define cryptography. Apr 13 3.3 What is SMTP? Apr 14 3.4 What is encryption? Or Define Encryption. Nov 12, Apr 14 3.5 What is message digest? Apr 14 3.6 What is message authentication?, Apr 17 3.7 List out the keys that available in encryption. 3.8 What are the issues available in security protocols? Nov 15 3.9 List out the types of authentications in Encryption. Nov 15 3.10 Give any two examples of RFCs. Apr 16 3.11 Mention the functions of ICANN. Apr 16 3.12 What was the Original primary purpose of HTML? Apr 12 3.13 What is key? Apr 12 3.14 Explain public key cryptography. Apr 12 3.15 What are the techniques available in Encryption? Nov 14 3.16 Write the advantages of Encryption. Nov 14 3.17 Write some of the messaging protocols. Nov 12 3.18 Define Authentication. Nov 12 Part B 3.19 Explain in detail about authentication methods. Apr 13 3.20 Discuss about the role of accountant in Internet related standard setting process. Apr 13 3.21 Discuss in brief about messaging securities issues. Apr 14 5

3.22 List out some of the security requirements for safe e-payments and explain it. 3.23 What are the security requirements for using online e-cash services? 3.24 How are security services implemented through SET? Discuss it. Nov 15 3.25 Draw the neat diagram of Encryption and discuss its techniques. Nov 15 3.26 What are the security requirements for using online e-cash services? Apr 16 3.27 Write short note on cryptography and its techniques. Nov 14 3.28 Write short note on key management in E-commerce. Nov 14 3.29 Explain in detail about public key cryptography. Nov 13 3.30 Explain about E-Commerce Security. Nov 13 3.31 Explain in detail about the usage of authentication in cryptography. Nov 13 3.32 Write a note on Security protocol and Messaging protocols. Nov 12 3.33 Tabulate the various security services and the techniques used to provide these service. Apr 17 Part C 3.34 Discuss about Internet security standards. Apr 13 3.35 Explain about security protocols and language. Apr 14 3.36 Write a brief note on (a) Security protocols and languages. (b) Secure Electronic payments and protocols. 3.37 Briefly describe the intrusion mechanisms and intrusion detection Nov 15 techniques in E-commerce. 3.38 What are various encryption techniques? Explain. Apr 12, Nov 13, Apr 16, Apr 17 3.39 Explain about Cryptography issues. Apr 12 3.40 Explain about key management. Apr 12, Nov 13 3.41 Explain the symmetric and asymmetric algorithm of encryption standard. Nov 14 3.42 Discuss about Cryptography and Authentication. Nov 12 6

Unit IV Part A 4.1 What is firewall? Apr 13 4.2 Define the set protocol. Apr 13, Nov 13, Nov 12 4.3 Write any two commercial firewall software. Apr 13, Nov 12 4.4 Define proxy. Apr 14 4.5 What is an electronic check? Apr 14 4.6 What are the ways to secure firewall? 4.7 Mention the purpose of smart card. 4.8 What do you mean by Electronic cash?, Apr 17 4.9 Write the limitations of security prevention provided by firewall. Nov 15 4.10 What do you meant by magnetic strip card. Nov 15 4.11 What do you mean by firewall? Apr 16 4.12 When will IP spoofing occur? Apr 16 4.13 What is a network topology? Apr 12 4.14 What is an smart card? Apr 12 4.15 List out the security issues in electronic payments. Nov 14 4.16 Mention the purpose of SET protocol. Nov 14 4.17 Illustrate the components of firewall. Nov 14 4.18 What is the usage of magnetic strip cards? Nov 13, Apr 17 4.19 Write any two secure Electronic Payment System. Nov 12 Part B 4.20 Write a note on magnetic strip, smart cards. Apr 13 4.21 What are the factors to consider in firewall design? Apr 13 7

4.22 Explain about components of firewalls. Apr 14, Apr 16 4.23 Write short note on: (a) E-check and (b) SSL. 4.24 Write about the open system interconnect. Apr 16 4.25 Explain about secure Electronic payment protocols. Apr 12 4.26 What are the factors to consider in Firewall design? Apr 12 4.27 What are the different layers of TCP/IP protocol stack? Discuss it. Nov 14 4.28 Explain the concept of functionality of firewalls. Nov 14 4.29 Explain about secure electronic payment protocols. Nov 13 4.30 What are the limitations of security prevention provided by firewall? Nov 12 4.31 Discuss about E-Cash, E-Check, Smart Card. Nov 12 4.32 What is a Smart Card? What are its types? Explain. Apr 17 Part C 4.33 Discuss about components and functionality of firewalls. Nov 12, Apr 13 4.34 Explain about SET and differences between SET & SSL. Apr 14 4.35 Explain the features of an e-payment system and its capabilities of intelligent agent. 4.36 List out some of the Electronic Payment System. Explain. Nov 12, Nov 15 4.37 Discuss in detail about the secure electronic payments and protocols Nov 15 with suitable diagram 4.38 Describe the factors to consider in firewall design. Apr 16 4.39 What are the various functionalities of Firewalls? Apr 12, Nov 13, Apr 17 4.40 Illustrate and describe how SSL helps an E-commerce system to be secure. Unit V Nov 14 Part A 5.1 Define in-house solutions. Apr 13 5.2 What are the scopes of web based marketing? Apr 13, Nov 12 8

5.3 Write any two P s applied to Internet marketing. Apr 13 5.4 What is an intelligent agent? Apr 14 5.5 What is an impression? Apr 14 5.6 What are the goals of web based marketing., Apr 17 5.7 Write the impacts of Intelligent agent. 5.8 Write the scope of marketing., Nov 13 5.9 Write the impacts of Marketing techniques. Nov 15 5.10 Write the scope of online advertisement. Nov 15 5.11 What is single agent system? Apr 16 5.12 Mention the capabilities on intelligent agent. Apr 16, Apr 17, Nov 13 5.13 Define information overload. Apr 12 5.14 What is an online banner advertising? Apr 12 5.15 Give any two limitations of Intelligent agent. Nov 14 5.16 Write down the impacts of Internet marketing. Nov 14 5.17 Give any two website design issues. Nov 13, Apr 17 5.18 Give out the impacts on marketing. Nov 13, Apr 17 5.19 Define P personalization. Nov 12 Part B Q.No. Question Month & Year 5.20 Explain in detail about web based marketing. Apr 13 5.21 Explain about online information chain. Apr 14, Apr 12 5.22 Explain the role of E-commerce in Supply chain management. 5.23 Write short note on : (a) fifth P personalization and (b) online information chain. Nov 15 5.24 Discuss any two passive and active advertising methods. Nov 15 5.25 Explain the different web technologies used for E-commerce. Nov 15 5.26 Write about Internet advertisement categories in E-commerce scenario. 9

5.27 Write short note on Spam mail. Apr 16 5.28 What are the four "P"s applied to internet marketing? Apr 12 5.29 Enumerate the difficulties faced in business marketing and advertisements. Nov 14 5.30 What are the four s applied to Internet marketing? Nov 13 5.31 What are the capabilities and limitations of intelligent agent? Nov 12 5.32 Explain the different ways to On-line advertisements through e-mails. Apr 17 Part C 5.33 Explain in detail capabilities, levels and limitations of intelligent agent. Apr 13 5.34 a) Discuss capabilities of internet agents. b) Explain about intelligent agents and electronic commerce. Apr 14 5.35 Explain about online advertising mechanisms. Apr 14, Apr 12, Nov 13 5.36 Write about various Internet tools required for successful E-commerce. Discuss in detail. 5.37 Discuss about the various issues in website design and the limitations of e- advertisement. 5.38 How are intelligent agents utilized for the online advertising mechanism and discuss the strategies of marketing? Nov 15 Nov 15 5.39 Elaborate the Internet marketing techniques. Apr 16 5.40 Discuss the life cycle for developing an E-commerce website and mention its issues. Nov 14 5.41 Write about different strategies involved in online. Discuss in detail. Nov 14 5.42 Explain in detail about web based marketing. Nov 12 5.43 Elaborate the relationship of five P s and the customer oriented value chain. Apr 17 5.44 Illustrate the role of Intelligence agents in E-Commerce Apr 17 10