Network Security (December – 2017) [IDOL - Revised Course | Question Paper]


Network Security (December – 2017) [Revised Syllabus | Question Paper]
Network Security (December – 2017) [Revised Syllabus | Question Paper]

➤ VIEW:
@SlideShare | @Tumblr | @Instagram | @Behance | @Pinterest | @Flickr

➤ DOWNLOAD:
@GitHub | @HostFree | @G-Drive

Time: 3 Hours
Total Marks: 100

N.B.:
(1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
(6) Use of Non-Programmable Calculator is allowed.

Q.1. Attempt any two of the following: (10 Marks)
(A) What four requirements were defined for Kerberos?
(B) Describe Transport Mode and Tunnel Mode.
(C) What is Application Level Gateway? Explain its working.
(D) Explain the Header format of MIME Messages.

Q.2. Attempt any three of the following: (15 Marks)
(A) Define the following:
       (i) Cryptography
       (ii) Symmetric Encipherment
       (iii) Asymmetric Encipherment
(B) Explain the working of DES.
(C) Define Cryptosystem. Explain it with suitable diagram.
(D) What is Shift Cipher? Explain with simple example.
(E) List some of the components of Modern Block Cipher.
(F) Explain p-1 Factoring Algorithm.

Q.3. Attempt any three of the following: (15 Marks)
(A) Explain "ElGamal Signature Scheme".
(B) Write a note on Digital Signature.
(C) Explain Fail-Stop Signatures in detail.
(D) Explain Blom's Scheme of Key Distribution.
(E) Write a short note on Station-To-Station Protocol.
(F) Explain Diffie-Hellman Key Exchange Algorithm.

Q.4. Attempt any three of the following: (15 Marks)
(A) Define Computer Security. Explain the necessity of Computer Security.
(B) What are the problems of Computer Security Mechanism?
(C) Describe CIA Triad of Computer Security.
(D) List & explain the categories of Security Mechanism of x.800.
(E) Explain the following terms:
       (i) Authentication
       (ii) Access Control
       (iii) Non-Repudiation
(F) What are Active Attacks? Discuss various Passive Attacks.

Q.5. Attempt any three of the following: (15 Marks)
(A) Explain the General Format of PGP Message.
(B) What are three threats associated with user Authentication over a Network?
(C) Write short note on Kerberos.
(D) What are the various Web Security Protocols?
(E) What are the Operational Services of PGP? Explain any one.
(F) In S/MIME, Explain how Bob and Alice Exchange the Secret Key for Encrypting Messages.

Q.6. Attempt any three of the following: (15 Marks)
(A) What are the groups of IP Security Document?
(B) What Services are provides by IPsec?
(C) Describe Anti-Relay Attack.
(D) Compare Transport Mode with Tunnel Mode of IP.
(E) Describe ESP Packet Format.
(F) What are the advantages of IP Security?

Q.7. Attempt any three of the following: (15 Marks)
(A) What is DMZ? Explain the importance of DMZ.
(B) What is the context of UNIX Password Scheme?
(C) How viruses are different from Worms and Trojan Horses?
(D) What are the typical phases of operation of Virus or Worm?
(E) What are advantages and disadvantages of Application Level Gateway? How is it different from Circuit Level Gateway and Packet Filter Firewall?
(F) What is DOS? How DOS is different from DDOS?




0 Comments