Internet Security (May – 2018) [IDOL: Old Course | Question Paper]


Internet Security (May – 2018) [IDOL: Old Course | Question Paper]
Internet Security (May – 2018) [IDOL: Old Course | Question Paper]

DOWNLOAD @
PDF | PDF
Text
Torrent
G-Drive
SlideShare

Time: 3 Hours
Total Marks: 100


NOTES:
(1) Question No. 1 is Compulsory.
(2) Attempt any four from Question Nos. 2 to 7.
(3) Make suitable assumptions wherever necessary and state the assumptions made.
(4) Answers to the same question must be written together.
(5) Numbers to the right indicate marks.
(6) Draw neat labeled diagrams wherever necessary.

Q.1. Attempt The Following Questions: (20 Marks)
(A) Why do we need security? Discuss.
(B) Write note on Incident Handling.
(C) What is security policy? Who is involved in formation of security policy?
(D) Explain the Caesar Cipher Scheme with an example. How to break Caesar Cipher?

Q.2. Attempt The Following Questions: (20 Marks)
(A) You are assigned the job of system administrator of a company. Explain how you will try to secure your network from the following that pose a threat to the security.
    (i) Viruses
    (ii) Hackers
    (iii) Employees
    (iv) Cookies

(B) What are the different types of viruses? Explain the structure of viruses.
(C) What firewalls can do? What firewalls cannot do? Where should we implement the firewall?

Q.3. Attempt The Following Questions: (20 Marks)
(A) State and explain different security models.
(B) Write a note on Digging of worms.
(C) Discuss in detail the classification of attacks.

Q.4. Attempt The Following Questions: (20 Marks)
(A) Discuss in detail Risk Analysis.
(B) What do we mean by proxy servers? Explain their working in detail. How are they different from circuit gateways?
(C) Write a note on Botnets.

Q.5. Attempt The Following Questions: (20 Marks)
(A) What is the difference between the substitution cipher and transposition cipher? What will be the output of the following plain text if we use Caesar Cipher to encode it?
"Social Engineering"
(B) What are bugs and backdoors? What prevention mechanism can be used for them?
(C) Explain in general working of Digital Signatures.

Q.6. Attempt The Following Questions: (20 Marks)
(A) Write the Diffie-Hellman Key Exchange algorithm and explain it in brief. Alex and Bob want to establish a secret key using this algorithm.
Given: n=11, x=2, y=3. Find the values of secret key (K1 and K2)
(B) What are the different ways of sniffing the password? How password sniffing can be avoided?
(C) Explain the concept of filtering by service with respect to TELNET.

Q.7. Attempt The Following Questions: (20 Marks)
(A) Define message digest. Write any one message digest algorithm.
(B) What is meant by public key and private key in cryptography? What is encryption and decryption of message? What is there importance in transmitting information over the network?
(C) Explain what you mean by Plain Text, Cipher Text, Encryption and Decryption.


0 Comments