Network Security (May – 2017) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [May – 2017 | Question Paper]
Network Security (Revised Syllabus) [May – 2017 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download

Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two of The Question: (10 Marks)
(A) Write a note on Security Mechanism.
(B) What is Kerberos? Explain.
(C) Explain the SSL Architecture and explain the SSL Protocol Stack.
(D) What is DDOS Attack? What are the ways in which DDOS Attack can be classified?

Q.2 Attempt Any Three From The Following: (15 Marks)
(A) Give the difference between Symmetric and Asymmetric Encryption.
(B) Give the General Structure of DES Algorithm. Explain the various Mode of operation.
(C) Explain the RSA Cryptosystem.
(D) Explain Vigenere Cipher. Encrypt the following text using Vigenere cipher with Keyword MUMBAI
"TOMORROW IS A NEW DAY"
(E) Define Entropy. Explain the properties of Entropy.
(F) What is Cryptanalysis? Explain the Cryptanalysis of DES.

Q.3 Attempt Any Three From The Following: (15 Marks)
(A) Explain the MD4 algorithm for Message Digest Generation.
(B) Explain the Digital Signature Standard.
(C) Explain the Diffie-Hellman Key Exchange Algorithm.
(D) What are the different Cryptographic Hash Function criteria?
(E) What is Key Predistribution? Explain the concept.
(F) Write a note on Fail-Stop Signatures.

Q.4 Attempt Any Three From The Following: (15 Marks)
(A) Describe the various Security Services.
(B) What is the various Security Attacks identified under the OSI Security Architecture? Explain.
(C) Explain the Security Mechanism defined by X.800.
(D) What is Nonrepundiation? Explain with the help of an example.
(E) Explain the model for Network Security.
(F) Explain the challenges involved in establishing Computer Security.

Q.5 Attempt Any Three From The Following: (15 Marks)
(A) How is the certificate processing carried out by S/MIME?
(B) What is PGP protocol used for? Explain its features.
(C) When is the user certificate revoked in X.509? Explain each scenario.
(D) Write a note on Compression in PGP.
(E) What are the three enhanced security services proposed for S/MIME?
(F) Explain the authentication procedures used by X.509.

Q.6 Attempt Any Three From The Following: (15 Marks)
(A) What is ESP used for? Explain the ESP format in detail.
(B) Explain the basic combination of security association. What is the advantage of combining the security associations?
(C) What is SSL Record protocol? Explain its operations.
(D) State the areas where SET protocol can be used. Summarize the participants in SET system.
(E) Write a note on ISAKMP.
(F) Write a note on TLS.

Q.7 Attempt Any Three From The Following: (15 Marks)
(A) Explain the various ways in which a password file can be protected.
(B) Explain the architecture of Distributed intrusion detection.
(C) What are malicious programs? Give its classification.
(D) Write a note on Trojan horse.
(E) What are firewalls? What are its characteristics?
(F) What the various firewall configurations possible? Explain any one in detail.


0 Comments