Network Security (November – 2015) [CBSGS - 75:25 Pattern | Question Paper]


[Question Paper] Network Security (75:25 Pattern) [November – 2015]
[Question Paper] Network Security (75:25 Pattern) [November – 2015]

DOWNLOAD
➥ Download: PDF
➥ View: PDF
➥ View (Image): @Pinterest | @Flickr


B.Sc.IT: Semester – V
[Network Security]
Question Paper (November – 2015) [75:25 Pattern]

Time: 2 ½ Hours
Total Marks: 75


N.B.:   (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) List and Explain various principles of security.
(B) Encrypt the message "Come Home Tomorrow" using
      • Ceaser Cipher
      • Simple Columnar Transposition Techniques with the four columns. Order is 4, 2, 1, 3.
(C) Explain with the example Rail-Fence Transposition Technique.
(D) Write the Diffie-Hellman Key Exchange Algorithm. Also give Suitable example.

Q.2 Attempt Any Two Of The Following: (10 Marks)
(A) Explain the Electronic Code Book and Cipher Feedback Algorithm Modes.
(B) Explain with neat diagram working of DES Algorithm.
(C) Write the steps carried out for each round of IDEA.
(D) Explain the working of RC4 Algorithm.

Q.3 Attempt Any Two Of The Following: (10 Marks)
(A) Explain the concept of Digital Signature.
(B) What is Message Digest? Explain with suitable example.
(C) Explain the working of Secure Hash Algorithm.
(D) Write the step involved in RSA Algorithm.

Q.4 Attempt Any Two Of The Following: (10 Marks)
(A) Write the steps to create a Digital Certificate.
(B) Explain the Concept of Roaming Certificate.
(C) Differentiate between Simple Certification Protocol and Online Certificate Status Protocol.
(D) List and Explain different categories of Certificates types.

Q.5 Attempt Any Two Of The Following: (10 Marks)
(A) List Phases in Handshake Protocol. Explain each in brief.
(B) Differentiate between Secured Socket Layer and Transport Layer Security.
(C) List the various Firewall Configurations. Explain any two.
(D) Write a short note on Virtual Private Network.

Q.6 Attempt Any Two Of The Following: (10 Marks)
(A) What do you mean by Authentication Token? Explain how it works.
(B) Explain how Time Based Token works?
(C) How does Certificate-based Authentication Work?
(D) Explain the Working of Kerberos.

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) List and Explain different types of Criminal Attacks.
(B) Explain the Subkey Generation Part of Blowfish.
(C) Explain Knapsack Algorithm with suitable example.
(D) Write and Explain the PKIX Services.
(E) Explain types of Electronic Money Based on the Tracking of Money.
(F) What are the One-Way Authentication Approach’s? Explain any two.

0 Comments