Network Security (April – 2015) [CBSGS - 75:25 Pattern | Question Paper]


[Question Paper] Network Security (75:25 Pattern) [April – 2015]
[Question Paper] Network Security (75:25 Pattern) [April – 2015]

DOWNLOAD
➥ Download: PDF
➥ View: PDF
➥ View (Image): @Pinterest | @Flickr


B.Sc.IT: Semester – V
[Network Security]
Question Paper (April – 2015) [75:25 Pattern]

Time: 2 ½ Hours
Total Marks: 75


N.B.:   (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) Explain Vernam Cipher with example.
(B) List and explain types of Criminal Attacks.
(C) Why there is need for Security? Explain Security Models.
(D) Explain IP Spoofing and IP Sniffing in detail.

Q.2 Attempt Any Two Of The Following: (10 Marks)
(A) Explain Double and Triple DES.
(B) Explain ECB and CFB Algorithm Modes in detail.
(C) Explain details of One Round in IDEA.
(D) Write a note on Blowfish.

Q.3 Attempt Any Two Of The Following: (10 Marks)
(A) Explain in detail how Symmetric and Asymmetric Key Cryptography can be combined.
(B) State and explain with example steps involved with RSA Algorithm.
(C) How Hash-Based Message Authentication works?
(D) Explain problems with Public Key Exchange.

Q.4 Attempt Any Two Of The Following: (10 Marks)
(A) List and explain the content of a Digital Certificate.
(B) List and explain fields of a CRL.
(C) Explain Password Based Encryption Standard in detail.
(D) Write a note on Blom’s Scheme.

Q.5 Attempt Any Two Of The Following: (10 Marks)
(A) Explain how Security is implemented in GSM.
(B) Draw and explain Authentication Header Format.
(C) Distinguish between SSL and SET.
(D) Write a note on VPN.

Q.6 Attempt Any Two Of The Following: (10 Marks)
(A) Explain how Kerberos works.
(B) Explain how Time Based Tokens works?
(C) Write a note on Certificate Based Authentication.
(D) Explain One Way Authentication for carrying out the Handshake.

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) Explain Diffie Hellman Key exchange Algorithm with example.
(B) Explain processes in each Round of AES.
(C) Write a note RSA and Digital Signature.
(D) Explain Station to Station Protocol.
(E) Explain PGP Operations.
(F) Write a note on Single Sign On Approaches.

0 Comments