Network Security (October – 2012) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [October – 2012 | Question Paper]
Network Security (Revised Syllabus) [October – 2012 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download

Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) What is Packet Filter Firewall? Explain.
(B) How do IPSec maintain its Policy in Applications?
(C) What four requirements were defined for Kerberos?
(D) Describe OSI Security Architecture.

Q.2 Attempt Any Three Of The Following: (15 Marks)
(A) What are the different Modes of DES? Explain any one in detail.
(B) What are Ciphers? What is the difference between “Transposition Cipher” and “Substitution Cipher”?
(C) How does DES works?
(D) Define Cryptosystem. Explain it with suitable diagram.
(E) What is Shift Cipher? Explain with simple example.
(F) Explain the working of Affine Cipher with an example.

Q.3 Attempt Any Three Of The Following: (15 Marks)
(A) Write a short note on ElGamal Signature Scheme.
(B) What is the concept of Birthday Attack?
(C) Explain Digital Signature Standard.
(D) What is Signature Scheme? List some of its examples.
(E) What are the types of different Attack Models of Signature Scheme?
(F) Describe Diffie-Hellman Key Exchange Algorithm.

Q.4 Attempt Any Three Of The Following: (15 Marks)
(A) Define Computer Security. Explain the necessity of Computer Security.
(B) What are the problems of Computer Security Mechanism?
(C) Describe CIA Triad of computer security.
(D) List & explain the categories of security mechanism of x.800.
(E) Explain the following terms:
      (i) Authentication
      (ii) Access Control
      (iii) Non-Repudiation
(F) What are Active Attacks? Discuss various Passive Attacks.

Q.5 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the General Format of PGP Message.
(B) What are three threats associated with user Authentication over a Network?
(C) Write short note on Kerberos.
(D) Explain the Header Format of MIME Messages.
(E) What are the Operational Services of PGP? Explain any one.
(F) In S/MIME, explain how Bob and Alice exchange the secret key for Encrypting Messages.

Q.6 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the term: Security Association Bundle.
(B) Describe ESP Packet Format.
(C) Which Services are provided by IPsec? Explain.
(D) Describe Transport Mode and Tunnel Mode.
(E) What are the groups of IP Security Document?
(F) Describe Anti-Replay Attack.

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) What is DMZ? Explain the Importance of DMZ.
(B) What is the context of UNIX Password Scheme?
(C) How Viruses are different from Worms and Trojan Horses?
(D) What are the typical phases of operation of Virus or Worm?
(E) What is Application Level Gateway? Explain its working.
(F) What is DOS? How DOS is different from DDOS?


0 Comments