Network Security (April – 2014) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [April – 2014 | Question Paper]
Network Security (Revised Syllabus) [April – 2014 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download

Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) Explain IPSec Key Management.
(B) Use the Vigenere Cipher with keyword “WEALTH” to Cipher the message, “Life is full of Surprises”
(C) What is Message Digest? Explain its importance.
(D) Explain different types of Intrusion Detection System.

Q.2 Attempt Any Two Of The Following: (15 Marks)
(A) What is a Stream Cipher? How does it differ from Permutation Cipher? Describe with an example.
(B) Diagrammatically describe the Data Encryption Standard Algorithm.
(C) What is Public Key Cryptography? What are its advantages and disadvantages?
(D) Write down the steps involved in RSA Algorithm. Describe it with an example.
(E) What are Symmetric and Asymmetric Cryptographic Algorithm? Compare Them.
(F) What do you mean by differential Cryptanalysis? Describe with an example.

Q.3 Attempt Any Two Of The Following: (15 Marks)
(A) Define Hash Function. Discuss Security of Hash Functions.
(B) Explain in detail Birthday Attack.
(C) Explain in detail Diffie-Hellman Key Exchange Algorithm.
(D) Discuss Blom’s Key Predistribution Scheme.
(E) What is Digital Signature? Explain the concept in detail.
(F) Write a short note on ElGamal Signature Scheme.

Q.4 Attempt Any Two Of The Following: (15 Marks)
(A) Describe the OSI Security Architecture with a neat diagram.
(B) Explain the Model of Network Security.
(C) Explain the X.800 Security Services Standard.
(D) Explain the Impact of Theft of Data.
(E) What Functions need to be focused in Security Mechanisms?
(F) Write a short note on Denial of Service.

Q.5 Attempt Any Two Of The Following: (15 Marks)
(A) What is Public Key Infrastructure? What are the required Functionalities for that?
(B) Describe S/MIME with a neat diagram.
(C) Explain the working of Pretty Good Privacy.
(D) What are the various Web Security Protocols?
(E) Explain PKCS System.
(F) What four requirements were defined for Kerberos?

Q.6 Attempt Any Two Of The Following: (15 Marks)
(A) Explain IPSec Key Management.
(B) What is the concept of IKE? What are its feature? Explain IKE Header Format?
(C) Compare Transport Mode with Tunnel Mode of IP.
(D) What is the role of IPSec in routing application? Explain.
(E) What is Handshake Protocol and How it differs from Record Protocol?
(F) Explain the term: Security Association Bundle.

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) Who are intruders? Describe Their Characteristics.
(B) Describe the Structure of Virus.
(C) What is Firewall? Why do we need them?
(D) What are Advantages and Disadvantages of Application Level Gateway? How is it different from Circuit Level Gateway and Packet Filter Firewall?
(E) How Viruses are different from Worms and Trojan Horses?
(F) What is DOS? How DOS is different from DDOS?


0 Comments