Network Security (October – 2016) [IDOL - Revised Course | Question Paper]


Network Security (Revised Syllabus) [October – 2016 | Question Paper]
Network Security (Revised Syllabus) [October – 2016 | Question Paper]

➥ View @SlideShare(PDF) | @Pinterest | @Flickr
➥ Download

Time: 3 Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two Of The Following: (10 Marks)
(A) What is DOS? How DOS is different from DDOS?
(B) Describe OSI Security Architecture.
(C) Short note on Substitution Cipher.
(D) How does DES works? Explain.

Q.2 Attempt Any Three Of The Following: (15 Marks)
(A) Explain the concepts of RSA Algorithm.
(B) What is Shift Cipher? Explain with simple example.
(C) Compare between Symmetric Cryptography and Asymmetric Cryptography.
(D) What is the concept of Vigenere Cipher Encryption? Explain.
(E) Define Cryptosystem. Explain the concept of Cryptosystem with the help of Communication Channel.
(F) What are the different types of Cryptoanalysis Attacks? Explain.

Q.3 Attempt Any Three Of The Following: (15 Marks)
(A) What is Digital Signature? Explain the concept in detail.
(B) Describe Blom's Key Distribution Scheme.
(C) Explain in detail Diffie-Hellman Key Exchange Algorithm.
(D) Short note on Station To Station Protocol.
(E) What is the concept of Birthday Attack? Explain.
(F) What is Signature Scheme? List some examples.

Q.4 Attempt Any Three Of The Following: (15 Marks)
(A) List & explain the categories of Security Mechanisms of x.800.
(B) Describe the Layered Model of OSI.
(C) Define Computer Security. Explain the necessity of Computer Security.
(D) Differentiate between Passive Attack & Active Attack.
(E) Explain the types of Passive Attack.
(F) Explain Network Security Model.

Q.5 Attempt Any Three Of The Following: (15 Marks)
(A) Describe PGP Trust Model.
(B) What is the concept of Key Ring in Key Management?
(C) What are the functions of S/MIME?
(D) Short note on PKIX Model.
(E) What are the contents of X.509 certificates?
(F) Short note on Kerberos.

Q.6 Attempt Any Three Of The Following: (15 Marks)
(A) What are the advantages of IP Security? Explain.
(B) Describe ESP Packet Format.
(C) Describe Anti-Relay Attack.
(D) Describe Transport Mode & Tunnel Mode.
(E) Explain the term: Security Association Bundle.
(F) What services are provides by IPsec?

Q.7 Attempt Any Three Of The Following: (15 Marks)
(A) What is Honeypot? Explain.
(B) Explain the following terms: Trojan Horse, Morris Worm.
(C) What are the typical Phases of operation of Virus or Worm?
(D) What is a Firewall? Explain the necessity of Firewall.
(E) What are the various Antivirus Techniques? Explain.
(F) What is DMZ? Explain the importance of DMZ.


0 Comments