Trending ▼   ResFinder  

2003 Course Network & Information Security

3 pages, 28 questions, 0 questions with responses, 0 total responses,    0    0
pune_eng
  
+Fave Message
 Home > pune_eng >

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Total No. of Questions : 12] [Total No. of Pages : 3 P1289 [3864]-409 B.E. NETWORK AND INFORMATION SECURITY Time : 3 Hours] [Max. Marks : 100 Instructions to the candidates: 1) Attempt any three questions from Section - I and three questions from Section - II. 2) Figures to the right indicate full marks. 3) Draw neat diagrams wherever necessary. 4) Make suitable assumptions wherever necessary. SECTION - I Q1) a) b) Explain the basic security concepts. How the individual components of the system are identified for analysis. [8] Explain the ISO Security Architecture. [8] OR Q2) a) b) Q3) a) b) What are typical phases of operation of viruses or worms? How do the worms propagate? [8] Explain Man-in-Middle attacks and Reply attacks with suitable example. What are different security measures to control these attacks? [8] Enlist and explain the principles of Public Key Cryptosystem. [8] Enlist and explain three threats associated with user authentication over a network or internet. [8] P.T.O. OR Q4) a) b) Q5) a) b) Explain basic arithmetic and logical functions used in MD5 and SHA1 operation. [8] Enlist HMAC design objectives and explain HMAC algorithm with structure. [8] What is triple encryption? Explain meet-in-middle attack in DES with suitable example. [9] Explain different type of attacks addressed by message authentication.[9] OR Q6) Write short notes on : a) b) c) d) [18] Digital Signatures. Kerberos. Trusted systems. Elliptical curve cryptography. SECTION - II Q7) a) b) What is the purpose of the X.509 standard? How is an X.509 certificate [8] revoked? What are key components of VPN? Discuss various security issues concern to VPN. [8] OR Q8) a) b) What services are provided by IPSec? Explain various application of IPSec with examples. [8] What are key components of VPN? Discuss various security issues concern to VPN. [8] Q9) a) What protocols comprise SSL? What is the difference between SSL connection and SSL sessions? [8] b) What are different types of Intruders in the system? Explain with examples. [8] [3864]-409 2 OR Q10)a) List and define the principle categories of SET participants. [8] b) List and explain the techniques used to avoid guessable password. [8] Q11)a) What is OS hardening? Explain the concepts of Honey pot with suitable illustration. [10] Explain the difference between Packet filtering router and Stateful inspection firewall. [8] b) OR Q12)Write short notes on any three : a) Email Security. b) Smart Card Security. c) WiFi and WiMax Security. d) Advanced Encryption Standard. vvvv [3864]-409 3 [18]

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 


Tags : Pune, Engineering, University of Pune, Engineering question papers, Pune University, previous year question papers, question papers, india, model question paper, pune university paper pattern, pune university syllabus, old question papers  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

pune_eng chat