Network Security (April – 2015) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [April – 2015 | Question Paper]
Network Security (Revised Syllabus) [April – 2015 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download


Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) Write a note on SET Model.
(B) Give various definition of Collision-Free Hash Function.
(C) Write a note on PGP Certificate that will cover Introducer Trust and Certificate Trust. Give Example.
(D) Sate and Explain various Fields present in an Audit Record.

Q.2 Attempt Any Three Of The Following: (15 Marks)
(A) State and Explain Shift Cipher Algorithm with example.
(B) State and explain steps involved in Permutation Cipher. Also give an example.
(C) Explain how Key is generated using a Linear Feedback Shift Register.
(D) Explain Variation available in DES.
(E) State and explain Chinese Remainder Theorem with example.
(F) State and Explain Vigenere Cipher Algorithm with example.

Q.3 Attempt Any Three Of The Following: (15 Marks)
(A) Explain in detail the concept of the Digital Signature.
(B) Write a note on Hash Function from Cryptosystem.
(C) Explain in details Station-to-Station Protocol.
(D) Explain Diffie-Hellman Key Exchange Algorithm with example.
(E) Explain the concept of Timestamping.
(F) Explain Transmission of Session Key using Kerberos.

Q.4 Attempt Any Three Of The Following: (15 Marks)
(A) Define Computer Security and three Key Objective of Computer Security.
(B) What is the OSI Security Architecture?
(C) List and briefly define any two categories of Security Services.
(D) Draw and Explain Model for Network Security.
(E) State and Explain the challenges of Computer Security.
(F) List and briefly define categories of Passive Security Attacks.

Q.5 Attempt Any Three Of The Following: (15 Marks)
(A) Draw diagram and explain X.509 Certificate Format.
(B) Explain the use of Key rings with example.
(C) Write a note on S/MIME functionality and Key Management Functions.
(D) What all are the advantages of Kerberos Version 5.
(E) Explain any two steps of Kerberos.
(F) Explain PKIX Management Functions.

Q.6 Attempt Any Three Of The Following: (15 Marks)
(A) List & Explain Applications & Advantages of IPSec.
(B) Explain Oakley Key determine Protocol & how does it work.
(C) Explain any two Phases of Handshake Protocol.
(D) Explain Buffer Overflow Attack on SSL.
(E) Draw and Explain ESP (Encapsulating Security Payload) Format.
(F) Write a note on IKE (Internet Key Exchange) Protocol & SA (Security Association).

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) What is a DDoS Attack? State and Explain its Countermeasures.
(B) What is the role of compression in the operation of a virus? Explain with diagram.
(C) Explain the concept of Honey Pot.
(D) What is an Application-Level Gateway? Explain.
(E) Write a note on different Firewall Configurations.
(F) Write a note on Packet Filter Firewall.


0 Comments