Exam Details
Subject | information security | |
Paper | paper 6 | |
Exam / Course | m.sc. data science | |
Department | ||
Organization | rayalaseema university | |
Position | ||
Exam Date | December, 2017 | |
City, State | andhra pradesh, kurnool |
Question Paper
M.Sc. DEGREE EXAMINATION, NOVEMBER/DECEMBER 2017.
Third Semester
Data Science
Paper VI INFORMATION SECURITY
2 21431
Time 3 Hours Max. Marks 70
SECTION — A
Answer any FIVE questions. 6 30 Marks)
Each question carries 6 marks.
1. Describe about CNSS security model.
2. Write about security system development life cycle.
3. Explain the principles of public key crypto systems.
4. User A and B exchange the key using Diffie-Hellman algorithm. Assume 5
q 11, XA 2 and XB 3 . Find the value of YA YB and k.
5. Write about various modes of arbitrated digital signatures.
6. Differentiate MAC and Hash function.
7. Write short notes on intrusion detection.
8. Describe various services are provided by IPSec.
SECTION — B
Answer ONE question from each Unit. 10 40 Marks)
Each question carries 10 marks.
UNIT I
9. Discuss various approaches to information security implementation.
Or
10. State and explain different components of information system.
UNIT II
11. Write about Encryption and Decryption functions of Triple DES.
Or
12. Explain the possible threats for RSA and list their counter measures.
UNIT III
13. Describe the steps in message digest generation in Secure Hash Algorithm in
detail.
Or
14. Write about the features of X.509 and Kerberos.
UNIT IV
15. Explain how email messages are protected using S/MIME signing and encryption.
Or
16. Write about firewall design principles and also different types of firewalls.
——————
Third Semester
Data Science
Paper VI INFORMATION SECURITY
2 21431
Time 3 Hours Max. Marks 70
SECTION — A
Answer any FIVE questions. 6 30 Marks)
Each question carries 6 marks.
1. Describe about CNSS security model.
2. Write about security system development life cycle.
3. Explain the principles of public key crypto systems.
4. User A and B exchange the key using Diffie-Hellman algorithm. Assume 5
q 11, XA 2 and XB 3 . Find the value of YA YB and k.
5. Write about various modes of arbitrated digital signatures.
6. Differentiate MAC and Hash function.
7. Write short notes on intrusion detection.
8. Describe various services are provided by IPSec.
SECTION — B
Answer ONE question from each Unit. 10 40 Marks)
Each question carries 10 marks.
UNIT I
9. Discuss various approaches to information security implementation.
Or
10. State and explain different components of information system.
UNIT II
11. Write about Encryption and Decryption functions of Triple DES.
Or
12. Explain the possible threats for RSA and list their counter measures.
UNIT III
13. Describe the steps in message digest generation in Secure Hash Algorithm in
detail.
Or
14. Write about the features of X.509 and Kerberos.
UNIT IV
15. Explain how email messages are protected using S/MIME signing and encryption.
Or
16. Write about firewall design principles and also different types of firewalls.
——————
Other Question Papers
Subjects
- big data analytics
- cloud computing
- data mining
- data warehousing and mining
- electronics instruments and measurements
- information security
- machine learning for big data
- optimization techniques
- python programming
- r programming
- software engineering