Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | October, 2018 | |
City, State | maharashtra, solapur |
Question Paper
M.C.A. (Semester (CBCS) Examination Nov/Dec-2018
Science
NETWORK SECURITY
Time 2½ Hours Max. Marks: 70
Instructions: All questions are compulsory.
Figures to the right indicate full marks.
Q.1 Choose the correct alternative 14
A monotonically increasing counter value; this provides an antireplay
function.
Sequence number Security parameters Index
Payload Data (variable) None of these
A variable-length field (must be an integral number of 32-bit words)
that contains the Integrity Check Value computed over the ESP packet minus
the Authentication Data field.
Pad length bits) Next Header bits)
Authentication Data (Variable) None of these
A legitimate user who accesses data, programs, or resource for
which such access is not authorized, or who is authorized for such access but
misuses his or her privileges.
Clandestine user Misfeasor
Masquerader None of these
A takes place when one entity pretends to be a different entity.
Modification of message Replay
Denial of service Masquerade
is the ability to limit and control the access to host systems and
applications via communications links.
Data Confidentiality Data Integrity
Access control Nonrepudiation
An overview of a security architecture.
RFC 2401 RFC 2402
RFC 2406 RFC 2408
is the scrambled message produced as output.
Plaintext Ciphertext
Continuous text None of these
ESP stands for
Encryption Security Protocol Encipher security principle
Encryption Sequence Protocol Encapsulated Security Payload
provides security services between TCP and application that use TCP.
SMTP HTTP
SSL UDP
10) MIME is an extension to the framework that is intended to address
some of the problems and limitations of the use of SMTP.
RFC 822 RFC 2402 8
RFC 2406 RFC 2408
Page 2 of 2
SLR-SN-43
11) The way in which an object is accessed by a subject.
Object Subject
Access right None of these
12) controls access to a service according to which user is attempting
to access it.
Service control User control
Behavior control Direction control
13) The length of time between two related events.
Gauge Interval timer
Counter Resource utilization
14) A model is used to establish transition probabilities among various
states.
Multivariate Operational
Time series Markov process
Q.2 Answer the following. (Any four) 08
What is Passive Attack?
What do you mean by Data Integrity?
What is cryptography?
Explain the procedure of Password Authentication Protocol.
How Block cipher works?
Write notes on. (Any two) 06
Access control mechanism
Private key
Applications of IPSec.
Q.3 Answer the following. (Any two) 08
Define Attack? Explain different types of active attacks.
Explain Bell-LaPadula Model with Example.
What is Security Association Explain the major three SA
parameters.
Answer the following. (Any one) 06
Explain the procedure of DES algorithm with example.
Explain how Transport mode and Tunnel mode works.
Q.4 Answer the following. (Any two) 10
What is smart card? Explain the various applications of smart cards.
What is Secure Socket Layer Protocol? Explain the use of Change
Cipher Spec protocol.
What is Biometric? Explain different forms of biometrics with suitable
example.
Answer the following. (Any one) 04
Explain the procedure of EIGamal algorithm with example.
Explain the benefits of IPSec.
Q.5 Answer the following. (Any two) 14
What is ESP(Encapsulating Security Payload)? Explain the use of different
parameters used in it.
What is Intruder? Explain three classes of intruders.
What is Firewall? Explain Packet-Filtering Router.
Science
NETWORK SECURITY
Time 2½ Hours Max. Marks: 70
Instructions: All questions are compulsory.
Figures to the right indicate full marks.
Q.1 Choose the correct alternative 14
A monotonically increasing counter value; this provides an antireplay
function.
Sequence number Security parameters Index
Payload Data (variable) None of these
A variable-length field (must be an integral number of 32-bit words)
that contains the Integrity Check Value computed over the ESP packet minus
the Authentication Data field.
Pad length bits) Next Header bits)
Authentication Data (Variable) None of these
A legitimate user who accesses data, programs, or resource for
which such access is not authorized, or who is authorized for such access but
misuses his or her privileges.
Clandestine user Misfeasor
Masquerader None of these
A takes place when one entity pretends to be a different entity.
Modification of message Replay
Denial of service Masquerade
is the ability to limit and control the access to host systems and
applications via communications links.
Data Confidentiality Data Integrity
Access control Nonrepudiation
An overview of a security architecture.
RFC 2401 RFC 2402
RFC 2406 RFC 2408
is the scrambled message produced as output.
Plaintext Ciphertext
Continuous text None of these
ESP stands for
Encryption Security Protocol Encipher security principle
Encryption Sequence Protocol Encapsulated Security Payload
provides security services between TCP and application that use TCP.
SMTP HTTP
SSL UDP
10) MIME is an extension to the framework that is intended to address
some of the problems and limitations of the use of SMTP.
RFC 822 RFC 2402 8
RFC 2406 RFC 2408
Page 2 of 2
SLR-SN-43
11) The way in which an object is accessed by a subject.
Object Subject
Access right None of these
12) controls access to a service according to which user is attempting
to access it.
Service control User control
Behavior control Direction control
13) The length of time between two related events.
Gauge Interval timer
Counter Resource utilization
14) A model is used to establish transition probabilities among various
states.
Multivariate Operational
Time series Markov process
Q.2 Answer the following. (Any four) 08
What is Passive Attack?
What do you mean by Data Integrity?
What is cryptography?
Explain the procedure of Password Authentication Protocol.
How Block cipher works?
Write notes on. (Any two) 06
Access control mechanism
Private key
Applications of IPSec.
Q.3 Answer the following. (Any two) 08
Define Attack? Explain different types of active attacks.
Explain Bell-LaPadula Model with Example.
What is Security Association Explain the major three SA
parameters.
Answer the following. (Any one) 06
Explain the procedure of DES algorithm with example.
Explain how Transport mode and Tunnel mode works.
Q.4 Answer the following. (Any two) 10
What is smart card? Explain the various applications of smart cards.
What is Secure Socket Layer Protocol? Explain the use of Change
Cipher Spec protocol.
What is Biometric? Explain different forms of biometrics with suitable
example.
Answer the following. (Any one) 04
Explain the procedure of EIGamal algorithm with example.
Explain the benefits of IPSec.
Q.5 Answer the following. (Any two) 14
What is ESP(Encapsulating Security Payload)? Explain the use of different
parameters used in it.
What is Intruder? Explain three classes of intruders.
What is Firewall? Explain Packet-Filtering Router.
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology