[Question Paper] Network Security (60:40 Pattern) [April – 2014] |
➥ Download: PDF
➥ View: PDF
➥ View (Video): YouTube
B.Sc.IT: Semester – V
[Network Security]
Question Paper (April – 2014) [60:40 Pattern]
Time: 1 ½ Hours
Total Marks: 60
N.B.: (1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
Q.1 Attempt Any Two of The Question: (10 Marks)
(A) What are the Key Principles of Security? Brief them.
(B) Explain the different Active Attack?
(C) Write Short Notes On:
(i) Mono-Alphabetic Cipher
(ii) Rail Fence Technique
(D) Describe the Diffie-Hellman Key Exchange Algorithm with an example.
Q.2 Attempt Any Two of The Question: (10 Marks)
(A) What are Algorithmic Modes? Explain the working of Cipher Feedback Mode.
(B) How the Key Transformation is done in DES? What is the purpose of XOR and Swap Operations with respect to DES?
(C) Compare the processes of RC4 and RC5.
(D) Explain the purpose of Subkey Generation in Blowfish.
Q.3 Attempt Any Two of The Question: (10 Marks)
(A) What is Asymmetric Key Cryptography? How does it work?
(B) Describe the RSA Algorithm with an example.
(C) State the requirements for a Message Digest by a Sample Digest.
(D) What are the problems faced in Public Key Exchange?
Q.4 Attempt Any Two of The Question: (10 Marks)
(A) Write Short Notes On:
(i) Digital Certificates
(ii) Certifying Authority
(B) Describe the five Architecture Areas of PKIX Model.
(C) What are Hash Functions? Explain its working.
(D) Explain the Station to Station Protocol.
Q.5 Attempt Any Two of The Question: (10 Marks)
(A) Explain the TCP Segment Format with a neat diagram.
(B) What is an Application Gateway? How does it differ from Packet Filters?
(C) Describe the Handshake Protocol of SSL.
(D) What are the processes of SET?
Q.6 Attempt Any Two of The Question: (10 Marks)
(A) State the different steps involved in Clear Text Passwords.
(B) Write a Short Notes on Kerberos.
(C) What is a Key Distribution Centre? Explain the concept with a diagram.
(D) Describe the Mutual Authentication Approach.
NOTE:
If You're a B.Sc.IT Student of Mumbai University...and you've a previous year question papers then please mail us @ kamalbscit@yahoo.in
0 Comments