Network Security (May – 2016) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [May – 2016 | Question Paper]
Network Security (Revised Syllabus) [May – 2016 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download

Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) Describe ESP Packet Format?
(B) Write a Short Note on Substitution Cipher.
(C) What are the functions provided by S/MIME?
(D) Explain briefly three classes of intruders.

Q.2 Attempt Any Three Of The Following: (15 Marks)
(A) How does DES Work?
(B) Discuss any two attacks on RSA Cryptosystem.
(C) What is the concept of Vignere Cipher? Explain with the help of an example.
(D) What are the modes of operations in DES? Explain.
(E) Write a short note on Public Key Cryptography.
(F) What are different types of Cryptanalysis Attacks? Explain.

Q.3 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the concept of Message Digest.
(B) What is Hash Function?
(C) What is the concept of Birthday Attack?
(D) Write a short note on Station To Station Protocol.
(E) What is the Key Agreement?
(F) Explain DSS Algorithm.

Q.4 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the various Security Attacks.
(B) Explain Security Service "Data Integrity" in detail.
(C) Explain briefly any two Security Mechanisms.
(D) Write a short note on Data Confidentiality and Privacy.
(E) Explain the OSI Security Architecture in detail.
(F) Describe CIA Triad of Computer Security.

Q.5 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the concept and working of Kerberos Realm.
(B) What is the purpose of X.509 Certificates? What is a Chain of Certificates?
(C) What is RFC 5322?
(D) List the five Principles Services provided by PGP and explain confidentiality in detail.
(E) What are the steps of Authentication Process? What are the means of Authentication of User's Identity?
(F) How do PGP Message support E-Mail Compatibility?

Q.6 Attempt Any Three Of The Following: (15 Marks)
(A) What is the role of IPSec in Routing Application?
(B) What are the benefits of IPSec?
(C) Explain very briefly SSL Protocol Stack.
(D) What is the difference between SSL Connection and SSL Session?
(E) What are the Attributes of Security Association Database?
(F) What is the concept of IKE? What are its features?

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) How does Worm Propagate in Network?
(B) What are the services of Firewall?
(C) What are the contents of Audit Records?
(D) List and Explain the classification of Viruses.
(E) Explain the three different Firewall Configurations.
(F) List four Techniques used by Firewalls to Control Access and Enforce a Security Policy.


0 Comments