Trending ▼   ResFinder  

2003 Course Networks & Information Security

3 pages, 31 questions, 0 questions with responses, 0 total responses,    0    0
pune_eng
  
+Fave Message
 Home > pune_eng >

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Total No. of Questions : 12] [Total No. of Pages : 3 P1277 [3664]-342 B.E. (Computer Engineering) NETWORKS AND INFORMATION SECURITY (2003 Course) (410448) Time : 3 Hours] [Max. Marks : 100 Instructions to the candidates:1) Attempt three questions from Section - I and three questions from Section - II. 2) Figures to right indicate full marks. 3) Draw neat diagrams wherever necessary. 4) Make suitable assumptions wherever necessary. SECTION - I Q1) a) b) What do you mean access control? Explain how access control matrix provides the security. [8] [8] List and explain the OSI security model. OR Q2) a) b) What is the difference between active and passive attack? Give one example of each. [8] Describe how DNS poisoning is carried out. How attacker knows the transfer of DNS databases? [8] Q3) a) Explain how message authentication code (MAC) ensures the integrity of message. Why private and public keys cannot be used in creating a MAC? [8] b) With respect to elliptical curve cryptography, explain the following points : [8] i) How to find the equation of the curve? ii) How to generate public and private keys? iii) How to create cipher text and iv) How to decrypt cipher text. OR P.T.O. Q4) a) b) Q5) a) b) Using RSA algorithm calculate the following : i) Given n = 221 and e = 5, find d. ii) Given n = 3937 and e = 17, find d. Explain the following with respect to X.509 : i) Certificate Renewal and ii) Certificate Revocation. [8] [8] What is the block size in DES? What is the cipher key size in DES? What is the round key size in DES? Why does the DES function need an expansion permutation? [10] What is double DES? What kind of attack on double DES makes it useless? [8] OR Q6) a) b) AES defines three different cipher key sizes (128,192, and 256); DES defines only one cipher key size. What are the advantages and disadvantages of AES over DES with respect to this difference. [10] What do you mean by the key expansion? Explain key expansion in IDEA. [8] SECTION - II Q7) a) b) Compare between PPTP and L2TP VPN protocol. [8] Explain IKE protocol along with phase I and phase II. Explain quick mode of phase two in detail. [8] OR Q8) a) b) Q9) a) b) Explain the IPSec security protocol AH and ESP. How AH provides the authentication and integrity checking capabilities? [8] List ISAKMP payload types and explain the purpose of each. [8] What do you mean by proxy firewall? Give the pros and cons of proxy firewalls. [8] How NAT in routers can be used to achieve the security for internal network? [8] OR [3664]-342 2 Q10)a) b) How to prevent the denial of service attack against the wireless LAN? [8] How a stateful firewall works? Explain stateful filtering and stateful inspection in this regard. [8] Q11)Write short notes on : a) SSL. b) PGP. c) [18] PEM. OR Q12)Write short notes on : a) SET. b) E-Cache. c) [18] Kerberos. vvvv [3664]-342 3

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 


Tags : Pune, Engineering, University of Pune, Engineering question papers, Pune University, previous year question papers, question papers, india, model question paper, pune university paper pattern, pune university syllabus, old question papers  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

pune_eng chat