Network Security (May – 2018) [IDOL: Revised Course | Question Paper]


Network Security (May – 2018) [IDOL: Revised Course | Question Paper]
Network Security (May – 2018) [IDOL: Revised Course | Question Paper]

DOWNLOAD @
☛ PDF | PDF
☛ Text
☛ Torrent
☛ G-Drive
☛ SlideShare

Time: 3 Hours
Total Marks: 100


NOTES:
(1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labelled Diagrams Wherever Necessary.
(6) Use of Non-Programmable Calculator is allowed.


Q.1 ATTEMPT ANY TWO QUESTIONS: (10 MARKS)
(A) Describe OSI Security Architecture.
(B) What is Signature Scheme? List some of its examples.
(C) What are the groups of IP Security Document?
(D) Write a note on IKE (Internet Key Exchange) Protocol & SA (Security Association).

Q.2 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) What are the different modes of DES? Explain any one in detail.
(B) What are Ciphers? What is the difference between "Transposition Cipher" and "Substitution Cipher"?
(C) Explain the working of DES.
(D) Explain p-1 Factoring Algorithm.
(E) Define Cryptosystem. Explain it with suitable diagram.
(F) Explain the working of Affine Cipher with an example.

Q.3 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) Write a short note on ElGamal Signature Scheme.
(B) What is the concept of Birthday Attack? Explain.
(C) Explain Digital Signature Standard.
(D) What is Signature Scheme? List some of its examples.
(E) What are the types of different Attack Models of Signature Scheme?
(F) Describe Diffie-Hellman Key Exchange Algorithm.

Q.4 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) What is active attack? Illustrate your explanations.
(B) Define Computer security and objectives of computer security.
(C) Explain Network security model in detail.
(D) Explain the different types of attacks.
(E) Explain the following terms:
     (i) Authentication
     (ii) Access Control
     (iii) Non-Repudiation
(F) Explain "Replay Attack and Traffic Analysis" with suitable examples.

Q.5 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) What is Public Key Infrastructure? What are the required functionalities for that?
(B) Describe S/MIME with a neat diagram.
(C) Explain the working of Pretty Good Privacy.
(D) What are the various Web Security Protocols?
(E) Explain PKCS System.
(F) What four requirements were defined for Kerberos?

Q.6 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) Give examples of situations where IPSec is used?
(B) Explain the various participants in SET (Secure Electronic Transaction).
(C) What are the Services provided by IPSec?
(D) What is the difference between SSL Connection and SSL Session?
(E) What are the Business requirements for Secure Payment processing with Credit Cards over the Internet?
(F) What is the difference between Tunnel Mode and Transport Mode with respect to IPSec? Why does ESP include a Padding Field?

Q.7 ATTEMPT ANY THREE QUESTIONS: (15 MARKS)
(A) What is Intrusion Detection System? Explain its benefits.
(B) List and explain Four Techniques used to avoid Guessable Passwords.
(C) Explain the Different Firewall Configurations.
(D) Explain briefly the Classes of Intruders.
(E) Write a short note on DDoS.
(F) What is a Firewall? List its advantages and disadvantages.

0 Comments