0% found this document useful (0 votes)
32 views4 pages

Secure Coding Techniques Jan 2024

Uploaded by

nithish9542
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views4 pages

Secure Coding Techniques Jan 2024

Uploaded by

nithish9542
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Code No: R204105U R20 Set No.

1
IV B.Tech I Semester Regular Examinations, January – 2024
SECURE CODING TECHNIQUES
(OE-IV: CSE, CSE-AIML, CSE-AI, CSE-DS, CSE-AIDS, AIDS, AIML & CSD)

Time: 3 hours Max. Marks: 70


Answer any FIVE Questions
ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT– I
1 a) Discuss about networking models in detail. [7]
b) Discuss any one of the recent security attacks with relevant example. [7]
(OR)
2 a) Demonstrate various networking components in detail. [7]
b) Discuss the elements of Cyber security in detail. [7]
UNIT– II
3 a) Discuss the role of Open Web Application Security Project in detail. [7]
b) Demonstrate SQL Injection in detail. [7]
(OR)
4 a) Discuss the effects of Insecure Deserialization in detail. [7]
b) Demonstrate Injection prevention methods. [7]
UNIT– III
5 a) How to manage trusted system objects in access control mechanism. [7]
b) Demonstrate how the memory resources needed to be handled through safe
coding. [7]
(OR)
6 a) Discuss about Data protection practices in detail. [7]
b) Discuss about sandboxing and its merits in detail. [7]
UNIT– IV
7 a) Briefly explain assertions in Java with relevant example code. [7]
b) Describe Serialization and Externalization in detail. [7]
(OR)
8 a) List out various software risks observed in C or C++. [7]
b) Discuss the Strategies to manage denial of service in detail. [7]
UNIT–V
9 a) Discuss different types of functions in Python. [7]
b) List out various external modules related to security in Python. [7]
(OR)
10 a) Demonstrate the process to install a security external module in Python. [7]
b) Discuss types of web requests in Python with example. [7]

1 of 1

|'''|||||''|'''|||'|
Code No: R204105U R20 Set No. 2
IV B.Tech I Semester Regular Examinations, January – 2024
SECURE CODING TECHNIQUES
(OE-IV: CSE, CSE-AIML, CSE-AI, CSE-DS, CSE-AIDS, AIDS, AIML & CSD)

Time: 3 hours Max. Marks: 70


Answer any FIVE Questions
ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT– I
1 a) Discuss about Cyber security services and objectives in detail. [7]
b) Discuss the benefits of a network and communication. [7]
(OR)
2 a) List out components of a Computer Network in detail. [7]
b) Discuss about various security attacks in detail. [7]
UNIT– II
3 a) Describe about Security Misconfiguration. [7]
b) Demonstrate Injection prevention methods. [7]
(OR)
4 a) Discuss the role of Open Web Application Security Project in detail. [7]
b) Demonstrate vulnerabilities in Broken Authentication and session
management. [7]

UNIT– III
5 a) List out Error handling practices needed in Secure coding. [7]
b) Demonstrate static and dynamic testing in secure coding. [7]
(OR)
6 a) Discuss about vulnerability scanning and penetration testing. [7]
b) Discuss about Declarative and Programmatic Security in detail. [7]

UNIT– IV
7 a) Discuss data visibility approaches in C++. [7]
b) Discuss the best practices in writing C++ code. [7]
(OR)
8 a) Demonstrate object slicing with relevant example in C++. [7]
b) Discuss about overriding virtual functions in C++. [7]
UNIT–V
9 a) Write a python a function validates whether a given user password consists
of 8 characters length and a digit or not. [7]
b) Give an example for lambda function in python. [7]
(OR)
10 a) List out the numbers that end with 4 in a given set of elements in Python. [7]
b) Demonstrate Python functions with example. [7]

1 of 1

|'''|||||''|'''|||'|
Code No: R204105U R20 Set No. 3
IV B.Tech I Semester Regular Examinations, January – 2024
SECURE CODING TECHNIQUES
(OE-IV: CSE, CSE-AIML, CSE-AI, CSE-DS, CSE-AIDS, AIDS, AIML & CSD)

Time: 3 hours Max. Marks: 70


Answer any FIVE Questions
ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT– I
1 a) Explain different benefits of computer network topologies in detail. [7]
b) Discuss the following: malware, spyware and warms. [7]
(OR)
2 a) Demonstrate OSI reference model with neat diagram. [7]
b) Discuss the key factors in Cyber security. [7]
UNIT– II
3 a) Discuss the Injection Risks and mitigation process. [7]
b) Discuss about Cross Site scripting in detail. [7]
(OR)
4 a) Explain the basic principles behind XSS attacks. [7]
b) Demonstrate Secure coding practices in detail. [7]
UNIT– III
5 a) Evaluate the checks to be done during the input validations in a Online
Payment Gateway scenario. [7]
b) List out session management practices in Secure coding. [7]

6 a) List out Error handling practices needed in Secure coding. [7]


b) List out the differences between http and https. [7]
UNIT– IV
7 a) Discuss about various defensive coding methods in C++. [7]
b) Demonstrate Constructor overloading and its relevance with sample C++
code. [7]
(OR)
8 a) Demonstrate object slicing with relevant example in C++. [7]
b) Discuss about overriding virtual functions in C++. [7]
UNIT–V
9 a) Write Python code to find out number of old age voters in a given list of n
voters in a village [7]
b) Develop simple Python script to find the sum of all the numbers given in a
file. [7]
(OR)
10 a) Demonstrate file handling in Python. [7]
b) Demonstrate HTTP requests in Python. [7]
1 of 1

|'''|||||''|'''|||'|
Code No: R204105U R20 Set No. 4
IV B.Tech I Semester Regular Examinations, January – 2024
SECURE CODING TECHNIQUES
(OE-IV: CSE, CSE-AIML, CSE-AI, CSE-DS, CSE-AIDS, AIDS, AIML & CSD)

Time: 3 hours Max. Marks: 70


Answer any FIVE Questions
ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT– I
1 Demonstrate ISO-OSI model layer Architecture with a neat diagram. [14]
(OR)
2 a) Discuss the key benefits of Local Area Networks in detail. [7]
b) Demonstrate TCP/IP model with a neat diagram. [7]
UNIT– II
3 a) Discuss key aspects in Broken access control? [7]
b) How can an attacker exploit XSS vulnerabilities to compromise user data? [7]
(OR)
4 a) Discuss about Cross Site Request Forgery attack in detail. [7]
b) How to prevent Sensitive Data Exposure? [7]
UNIT– III
5 a) List out session management practices in Secure coding. [7]
b) Explain about concurrency and configuration in secure coding. [7]
(OR)
6 a) Discuss about Memory management in Secure coding. [7]
b) How will be logging and auditing performed in secure coding. [7]
UNIT– IV
7 a) Discuss about various preventative planning methods in C++. [7]
b) Give a simple example for handling assertions in C++. [7]
(OR)
8 a) List out various ways to handle DOS attacks on Java Web API [7]
b) Implement Java Object Serialization with example. [7]
UNIT–V
9 a) Implement python script to count number of alphabets, digits and symbols in
a given file. [7]
b) Demonstrate external modules with examples. [7]
(OR)
10 a) Implement Python script to find number of 1s and 0s in a given binary string. [7]
b) Differentiate GET and POST requests in Python. [7]

1 of 1

|'''|||||''|'''|||'|

You might also like