Network Security (April – 2017) [CBSGS - 75:25 Pattern | Question Paper]


Network Security (75:25 Pattern) [April – 2017 | Question Paper]
Network Security (75:25 Pattern) [April – 2017 | Question Paper]

➥ Download
➥ View @SlideShare(PDF) | @Pinterest | @Flickr

Time: 2 ½ Hours
Total Marks: 100


N.B.:    (1) All Question are Compulsory.
            (2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
            (3) Answer To The Same Question Must Be Written Together.
            (4) Number To The Right Indicates Marks.
            (5) Draw Neat Labeled Diagrams Wherever Necessary.

Q.1 Attempt Any Two of the Question: (10 Marks)
(A) Describe the various Security Services.
(B) What are Poly-Alphabetic Ciphers? Explaining one technique with suitable example.
(C) What is Cryptanalysis? Explain different Cryptanalysis Attacks.
(D) What is DDOS Attack? What are the ways in which DDOS attack can be classified?

Q.2 Attempt Any Two of the Question: (10 Marks)
(A) Explain the working of AES Round in detail.
(B) Explain the Encryption Operation used in RC5 Algorithm.
(C) Explain the working of IDEA Algorithm.
(D) Write a note on Blowfish.

Q.3 Attempt Any Two of the Question: (10 Marks)
(A) What is Message Digest? Explain.
(B) Explain the working of the SHA Algorithm.
(C) What is a Digital Signature? Explain the different categories of verification.
(D) Explain the ElGamal Cryptosystems.

Q.4 Attempt Any Two of the Question: (10 Marks)
(A) Explain the Diffie Hellman’s Key Agreement Algorithm and its vulnerability.
(B) What is Key Pre-Distribution? Explain.
(C) Write a note on Station-To-Station Protocol.
(D) What is KDC? Explain its different implementations and significance.

Q.5 Attempt Any Two of the Question: (10 Marks)
(A) What are Firewalls? What are its characteristics and limitations?
(B) Write a note on IPSec Architecture.
(C) What is SSL Record Protocol? Explain its operations.
(D) Explain the Handshake Protocol Action.

Q.6 Attempt Any Two of the Question: (10 Marks)
(A) Explain the Password Based Authentication System. What are the problems associated with passwords?
(B) Write a note on Kerberos.
(C) Explain Biometric Authentication Technique.
(D) What is Certificate Based Authentication and explain its working.

Q.7 Attempt Any Three from the Following: (15 Marks)
(A) What are the different goals of Security? Explain the different attacks these Security goals are vulnerable to.
(B) Explain the working of DES function in details.
(C) What is Asymmetric Encryption? Explain the RSA Algorithm used for Asymmetric Encryption.
(D) Explain the concept of Digital Certificate and how it is created?
(E) What are the approaches used to Detect Intrusion? Give a brief description of each.
(F) Write a note on Authentication Token.

0 Comments