Network Security (October – 2013) [CBSGS - 60:40 Pattern | Question Paper]


[Question Paper] Network Security (60:40 Pattern) [October – 2013]
[Question Paper] Network Security (60:40 Pattern) [October – 2013]

DOWNLOAD
➥ Download: PDF
➥ View: PDF
➥ View (Image): @Pinterest | @Flickr
➥ View (Video): YouTube

B.Sc.IT: Semester – V
[Network Security]
Question Paper (April – 2014) [60:40 Pattern]

Time: 1 ½ Hours
Total Marks: 60


N.B.:   (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two of The Question: (10 Marks)
(A) Explain the concept of key range and key size.
(B) Define the following terms:
      (i) Cryptography
      (ii) Cryptanalysis
      (iii) Brute-Force Attack
      (iv) Symmetric Key Cryptography
      (v) Asymmetric Key Cryptography
(C) What are transposition techniques? Explain any one with the help of an example.
(D) What are the ethical and legal issues in computer security system?

Q.2 Attempt Any Two of The Question: (10 Marks)
(A) Explain the Cipher Block Chaining mode of the algorithm in detail.
(B) Explain blowfish algorithm and its advantages.
(C) Explain the steps in each round of DES.
(D) Explain the main features of AES, explain its steps at a high level.

Q.3 Attempt Any Two of The Question: (10 Marks)
(A) Explain the basics of digital signature.
(B) Explain the concept of message digest. What are the requirements of the message digest?
(C) Why HMAC cannot be trusted to be used in digital signatures?
(D) Explain the security solution based on the concept of Digital Envelope. Explain the security solution based on the concept of Digital Envelope.

Q.4 Attempt Any Two of The Question: (10 Marks)
(A) What is digital certificate? How is it created?
(B) Write a brief note on cross certification in digital certificates.
(C) What are CRLs (Certificate Revocation Lists)? How are they used?
(D) Write a brief note on PKCS#5 Password Based Encryption (PBE) standard.

Q.5 Attempt Any Two of The Question: (10 Marks)
(A) Explain the functioning of Packet filter firewall. Explain the possible attacks on it.
(B) Explain the advantages and applications of IPSec.
(C) Explain the concept of Dual signature in SET (Secure Electronic Transaction).
(D) What is PGP? Explain how PGP works.

Q.6 Attempt Any Two of The Question: (10 Marks)
(A) Explain authentication method based on Challenge/Response tokens.
(B) How does certificate based authentication work?
(C) Write a brief note on Kerberos.
(D) Explain different approaches of mutual authentication.


NOTE:
If You're a B.Sc.IT Student of Mumbai University...and you've a previous year question papers then please mail us @ kamalbscit@yahoo.in

0 Comments