You are here: Home > Computer Science CSE
All posts from

MCSCB105–3 Biometric Security M.Tech Model Question Paper : mgu.ac.in

Name of the College : Mahatma Gandhi University
Department : Computer Science and Engineering
Subject Code/Name : MCSCB 105 – 3 Biometric Security
Sem : I
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper :
I : https://www.pdfquestion.in/uploads/mgu.ac.in/5034-1-MCSCB%20105-3%20BS%20-%20I.doc
II : https://www.pdfquestion.in/uploads/mgu.ac.in/5034-2-MCSCB%20105-3%20BS%20-%20II.doc

Biometric Security Question Paper :

M.Tech Degree Examination :
Branch: Computer Science and Engineering
Specialization : Cyber Security

Related : MGU MCSCB105–1 Mobile Network Security M.Tech Model Question Paper : www.pdfquestion.in/5033.html

Model Question Paper – I
First Semester :
MCSCB 105 – 3 BIOMETRIC SECURITY
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Explain the benefits of biometrics over traditional authentication systems. (13)
b) Explain the benefits of biometrics in identification systems. (12)
OR
2. a) Write note on biometric matching methods. (12)
b) Write note on applications of biometric security system. (13)

3. a) Explain about physiological biometric technologies. (13)
b) Give note on biometric competing technologies. (12)
OR
4. a) Explain about facial scanning technologies. (13)
b) Write note on DNA biometrics. (12)

5. a) Write note on keyboard / keystroke dynamics. (13)
b) Explain about voice data acquisition (12)
OR
6. a) Explain about Handprint Biometrics technology. (12)
b) With suitable examples and diagrams, explain DNA signature and handwriting technology (13)

7. a) Explain Multi and Multi factor biometrics. (12)
b) What is Tickets and tokens in biometrics, explain the concepts with examples. (13)
OR
8. a) Explain two factor authentications. (12)
b) Explain the Behavioral and multifactor biometrics in identification systems. (13)

MCSCB 105 – 3
BIOMETRIC SECURITY :
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Write note on biometric matching methods. (12)
b) Write note on applications of biometric security system. (13)
OR
2. a) Describe the benefits of biometrics over traditional authentication systems. (13)
b) Explain the benefits of biometrics in identification systems. (12)

3. a) Discuss about facial scanning technologies. (13)
b) Write note on DNA biometrics. (12)
OR
4. a) Briefly explain about physiological biometric technologies. (13)
b) Give note on biometric competing technologies. (12)

5. Discuss the following
a) Handprint Biometrics (12)
b) DNA signature and handwriting technology (13)
OR
6. a) Write note on keyboard / keystroke dynamics. (13)
b) Explain about voice data acquisition (12)

7. Describe the following
a. Multi biometrics (6)
b. Multi factor biometrics (6)
c. Tickets and tokens (13)
OR
8. a) Explain two factor authentications. (12)
b) Describe the Behavioral and multifactor biometrics in identification systems. (13)

Syllabus :
Module I :
Biometrics- Introduction- benefits of biometrics over traditional authentication systems benefits of biometrics in identification systems-selecting a biometric for a system –Applications – Key biometric terms and processes – biometric matching methods -Accuracy in biometric systems.

Module II :
Physiological Biometric Technologies : Fingerprints – Technical description –characteristics – Competing technologies – strengths – weaknesses – deployment – Facial scan – Technical description – characteristics – weaknesses-deployment – Iris scan – Technical description – characteristics – strengths – weaknesses – deployment – Retina vascular pattern – Technical description – characteristics – strengths – weaknesses –deployment – Hand scan – Technical description-characteristics – strengths – weaknesses deployment – DNA biometrics.

Module III :
Behavioral Biometric Technologies : Handprint Biometrics – DNA Biometrics – signature and handwriting technology – Technical description – classification – keyboard / keystroke dynamics – Voice – data acquisition – feature extraction – characteristics – strengths – weaknesses- deployment.

Module IV :
Multi biometrics : Multi biometrics and multi factor biometrics – two-factor authentication with passwords – tickets and tokens – executive decision – implementation plan. Case studies on Physiological, Behavioral and multifactor biometrics in identification systems.

References :
1. Samir Nanavathi, Michel Thieme, and Raj Nanavathi, “Biometrics -Identity verification in a network”, Wiley Eastern, 2002.
2. John Chirillo and Scott Blaul,” Implementing Biometric Security”, Wiley Eastern Publications, 2005.
3. John Berger,” Biometrics for Network Security”, Prentice Hall, 2004.

M.Tech Degree Examination :
Branch : Computer Science and Engineering
Specialization : Cyber Security
Model Question Paper – I
First Semester
MCSCB 106 – 3 Secure Software Engineering : (Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks

Answer all questions.
1. a) Explain the different approach through software reliability engineering. (13)
b) Explain the software reliability engineering process. (12)
OR
2. a)Explain about software and hardware reliability. (12)
b) Write note on operational profile implementation. (13)

3. a) Explain how to Setting system failure intensity objectives. (15)
b) Explain the user needs for reliability and availability. (10)
OR
4. a) Explain the procedures for developing software failure intensity objectives. (13)
b) Discuss how to Plan new test cases for current release of software. (12)

5. a) Discuss the steps for Planning and allocating test time for the current release. (12)
b) Explain how to identifying test failures and analyzing test output. (13)
OR
6. a) Explain about Certifying reliability. (12)
b) Write note on tracking reliability growth in testing. (13)

7. a) Explain UML diagrams for security requirement. (15)
b) Write note on important security opportunities. (10)
OR
8. a) Explain Model based security engineering with UML. (13)
b) Explain different tools support for UML Sec. (12)

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap