Professional Documents
Culture Documents
UNIT I
PART A
Q.No. Question Competence Level
1 Define data modeling. Remembering BTL1
2 List the types of data models. Remembering BTL1
3 Define schemas. Remembering BTL1
4 Where physical model is used? Remembering BTL1
5 Name any two sources of Business rules. Remembering BTL1
6 Define Business Rules with an example. Remembering BTL1
7 Summarize the functionalities of JDBC. Understanding BTL2
8 Describe the connection object . Understanding BTL2
9 Contrast JDBC and ODBC. Understanding BTL2
10 Discuss OLEDB. Understanding BTL2
11 Illustrate stored procedure with an example. Applying BTL3
12 Demonstrate ACID properties. Applying BTL3
13 Discover Map parameters. Applying BTL3
14 Analyse Hadoop as a Service. Analysing BTL4
15 Point out any 2 features of Hadoop Cluster. Analysing BTL4
16 Compare Map Stage and Reduce stage. Analysing BTL4
17 Explain the features of Hive. Evaluating BTL5
18 Assess Hadoop Map Reduce. Evaluating BTL5
19 Design HDFS architecture. Creating BTL6
20 Prepare a query in HiveQL. Creating BTL6
PART-B
UNIT II
PART A
PART-B
Q.N
Question Competence Level
o.
1 Tell in detail about Remembering BTL1
i) Incomplete Mediation (10)
ii) TOCTTOU errors (6)
2 Explain the following Remembering BTL1
i) Software firewalls (8)
ii) Hardware firewalls (8)
3 i) List the kinds of Malicious code (8) Remembering BTL1
ii) Prevention of virus infection (8)
4 Briefly describe the following in Developmental Controls Remembering BTL1
i) Peer Reviews (6)
ii) Hazard Analysis (4)
iii) Testing (6)
Mr.K.Ravindran A.P (S.G), Mr.T.Veeramani A.P (O.G) IT6701-IM Page 3 of 9
5 i) Summarize the various firewall rules (8) Understanding BTL2
ii) Explain HIDS and NIDS in detail (8)
6 Describe the following Understanding BTL2
i) Buffer overflow Flaws (8)
ii) Faults (4)
iii) Failures (4)
7 Discuss the following in controls against threats(16) Understanding BTL2
i) Modularity (6)
ii) Encapsulation (4)
iii) Information hiding (6)
8 Illustrate the data protection principles in detail(16) Applying BTL3
9 i) Demonstrate the compliance with Data Security Laws (8) Applying BTL3
ii) Demonstrate the compliance with Privacy Laws (8)
10 Analyse the following in Implementing Security Defenses Analysing BTL4
i) Intrusion Detection (8)
ii) Virus Protection (8)
11 Differentiate Asymmetric Encryption with Symmetric Analysing BTL4
Encryption(16)
12 i) Classify Auditing, accounting and logging (8) Analysing BTL4
ii) Firewall to protect Systems and networks (8)
13 Explain the following in User Authentication Evaluating BTL5
i) Passwords (4)
ii) Password Vulnerability (3)
iii) Encrypted Password (3)
iv) One Time Password (3)
v) Biometrics (3)
14 i) Formulate the ways of protecting data through online Creating BTL6
privacy (8)
ii) Explain how to plan various national data protection
authorities (8)
UNIT III
PART A
13 Examine the maturity levels for Data Risk Management Applying BTL3
Framework.
14 Analyse Governance Maturity levels. Analysing BTL4
15 Point out the need of Information Security. Analysing BTL4
16 Connect Transparency in Data privacy. Analysing BTL4
17 Explain Major Components of the Data Governance Maturity Evaluating BTL5
Model.
18 Assess the Google Privacy policy. Evaluating BTL5
19 Design the conceptions of Privacy. Creating BTL6
20 Prepare the various states of Privacy. Creating BTL6
PART-B
11 i) Explain Product Data Synchronization (8) Analysing BTL4
ii) Explain Oracle MDM High Level Architecture (8)
12 i) Classify the information collected based on Privacy in Analysing BTL4
Google(8)
ii) Compare Metadata Vs Master Data Vs
Transactional(8)
13 Explain the following stages in Data Governance Maturity Evaluating BTL5
Model
i) Proactive (8)
ii) Governed (8)
14 i) Design a Typical Data Governance Organization Creating BTL6
Structure (8)
ii) Design the 3 different approaches in Data Quality
Management (8)
UNIT IV
PART A
PART-B
UNIT V
PART A
4 Describe the Data Retention (EC Directive) Regulations 2009. Remembering BTL1
5 Name any two exemptions for freedom of information act Remembering BTL1
2000.
6 Define ILM. Remembering BTL1
7 Discuss key benefits of PLCM. Understanding BTL2
8 Describe Cost Reduction Toolbox. Understanding BTL2
9 Give the Challenges in Big Data Testing. Understanding BTL2
10 Discuss Sensitivity Analysis. Understanding BTL2
11 Illustrate the steps you need to determine when writing a Applying BTL3
data retention policy.
12 Demonstrate Big data testing strategy. Applying BTL3
17 Explain the key capabilities of Big Data Testing Services. Evaluating BTL5
18 Assess DBAs better manage multiple database platforms within Evaluating BTL5
a single IT environment.
19 Create an archive in Hadoop. Creating BTL6
20 Prepare the steps for Big data ecosystem testing.. Creating BTL6
PART-B
4 i)Briefly describe the requirement for protecting data and Remembering BTL1
data collections based on classification (12)
ii)Tell about Canadian Privacy registration (4)
5 Summarize the Information Security and the internet(16) Understanding BTL2
6 Describe the ten signs of Big Data and Analytics testing in Understanding BTL2
detail(16)
7 i) Discuss about archiving data with Hadoop(8) Understanding BTL2
ii) Discuss about Cost Reduction toolbox (8)
8 i) Illustrate about PLM cost in detail (12) Applying BTL3
ii) Briefly Illustrate the key benefits of PLCM (4)
9 Illustrate Confidential data in detail with examples(16) Applying BTL3
10 i) Analyse the functional and performance of Big Data Analysing BTL4
testing(12)
ii) Explain Sensitive data handling procedures (4)
11 i) Differentiate sensitive information and confidential Analysing BTL4
information?(8)
ii) Briefly explain Data protection and human rights Act (8)
12 i) Briefly Explain the Most Challenging Database Analysing BTL4
Management Issues Facing Organizations(8)
ii) Database Administrator Challenges in an EBS
Environment(8)
13 Explain Challenges in Big Data Testing (16) Evaluating BTL5
14 Prepare a case study for handling confidential information(16) Creating BTL6
Verified by : 1. 2.
[K.Ravindran ] [T.Veeramani ]
3. 4.
[ ] [ ]
Approved by HOD :
***************