Internet Security (April – 2014) [IDOL - Old Course | Question Paper]




• Download (PDF) | • View (PDF) | • View (Image) | • YouTube (Video)

B.Sc.IT: Semester – V
[Internet Security]
Question Paper (April – 2014) [Old Syllabus]

Time: 3 Hours
Total Marks: 100


N.B.:   (1) Question No. 1 is Compulsory.
            (2) Attempt any four questions from Q.2 – Q.7.
            (3) Make suitable assumption whenever necessary and state the assumption made.
            (4) Answers to the same questions must be written together.
            (5) Numbers to the right indicate marks.
            (6) Draw a neat labelled diagram and give example whenever necessary.

Q.1 Attempt The Following Question: (20 Marks)
(A) Logic Bombs
(B) “Digging for Worms”
(C) Filtering Services for DNS
(D) PKC (Public Key Cryptography)

Q.2 Attempt The Following Question: (20 Marks)
(A) Explain the principles of Security.
(B) Explain Denial of Service Attack? What are the variations of the DOS Attack? Explain.
(C) Describe the Life-Cycle of a Virus.

Q.3 Attempt The Following Question: (20 Marks)
(A) Explain any of the Symmetric Cryptosystems Algorithm in detail.
(B) Can the firewall store the dynamic state entries? If yes, what firewall does support the same? Explain the characteristics of the same.
(C) What is Protocol Failure? Explain the loophole you identified in the protocols such as TCP/IP and SSH.

Q.4 Attempt The Following Question: (20 Marks)
(A) What are Worms? How they spread onto your systems? What are the different types of Worms? Explain the ways to eradicate them.
(B) Explain the different types of Firewall Configuration.
(C) Explain the steps in implementing Digital Signature for your organization.

Q.5 Attempt The Following Question: (20 Marks)
(A) Explain Substitution and Transposition Cipher Techniques in detail.
(B) Explain the characteristics, advantages and limitations of the firewall.
(C) What is Trojan Horse Program? How they affect computer programs? Explain its types.

Q.6 Attempt The Following Question: (20 Marks)
(A) Explain any of the Message Digest Algorithms.
(B) What are the commonly used methods for “Authentication o users”? How is the authentication failure observed in this?
(C) What is Security Policy? Explain them in detail.

Q.7 Attempt The Following Question: (20 Marks)
(A) Compare Digital Signature and Digital Envelop.
(B) Compare and contrast Symmetric and Asymmetric Cryptography.
(C) Compare Active and Passive Attack.
(D) Compare Distributed and Traditional Firewall.



NOTE:
If You're a B.Sc.IT Student of Mumbai University...and you've a previous year question papers then please mail us @ kamalbscit@yahoo.in

0 Comments