Network Security (April – 2016) [CBSGS - 75:25 Pattern | Question Paper]


[Question Paper] Network Security (75:25 Pattern) [April – 2016]
[Question Paper] Network Security (75:25 Pattern) [April – 2016]

DOWNLOAD
➥ Download: PDF
➥ View: PDF
➥ View (Image): @Pinterest | @Flickr


B.Sc.IT: Semester – V
[Network Security]
Question Paper (April – 2016) [75:25 Pattern]

Time: 2 ½ Hours
Total Marks: 75


N.B.:   (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) What is the concept of Pharming? Explain.
(B) What are the technical types of attacks? How is it varied on the practical side? Explain.
(C) Illustrate and Explain the concept of key exchange in Diffie-Hellman Algorithm.
(D) List and Explain the general types of Attacks.

Q.2 Attempt Any Two Of The Following: (10 Marks)
(A) What is the concept of IV in CFB Mode? Explain.
(B) What are the different Modes of RC5 that can be used to improve its performance?
(C) How does the one time initialization process works in AES? Explain.
(D) Explain the sub-key generation in the Blowfish Algorithm.

Q.3 Attempt Any Two Of The Following: (10 Marks)
(A) How is the combination of Symmetric and Asymmetric Key together more efficient in Security Solution? Explain with the concept of Key Wrapping.
(B) What is HMAC? What are the disadvantage of HMAC? Explain.
(C) What is the concept of Message Digest? Explain LRC.
(D) Write a short note on RSA.

Q.4 Attempt Any Two Of The Following: (10 Marks)
(A) Discuss the Offline Mode of certification checking of Digital Certificate using CRL Mechanism.
(B) Explain the standard PKCS #5 – PBE.
(C) Write a short note on Station to Station Protocol.
(D) What are the types of Digital Certificates? Explain.

Q.5 Attempt Any Two Of The Following: (10 Marks)
(A) List and brief all the participants belonging to SET process.
(B) What is Firewall? Explain Packet Filter Firewall.
(C) Why is Offline E-Money Dangerous? Discuss Double spending problem.
(D) Explain note on S/MIME Protocol in detail.

Q.6 Attempt Any Two Of The Following: (10 Marks)
(A) What is SSO Approach? What are its approaches?
(B) How does something derived from the password work? Explain with the help of Message Digest of the percentage.
(C) What is the use of Smart Cards? What is the problem with the Smart cards if the large Data needs to be processed? Explain.
(D) Write a short name on Biometric Authentication.

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) Discuss the concept of Man-In-Middle Attack regarding Diffie-Hellman Key Exchanges Algorithm.
(B) What is the principle of IDEA Algorithm? Explain.
(C) Explain the Algorithms: ECC, Knapsack
(D) What is the role of CA and RA? Discuss the mechanisms for checking the user's proof of the possessions (POP) of the private Key by RA.
(E) Write a short note on PGP.
(F) Write a short note on Authentication Token.

0 Comments