Exam Details

Subject network security
Paper
Exam / Course m.sc. computer science
Department
Organization solapur university
Position
Exam Date October, 2018
City, State maharashtra, solapur


Question Paper

M.Sc. (Semester IV) (CBCS) Examination Nov/Dec-2018
Computer Science
NETWORK SECURITY
Time: 2½ Hours Max. Marks: 70
Instructions: Q.1 and Q.2 is compulsory.
Attempt any three questions from Q. 3 to 7.
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives: 10
Which of the following attack is not a threat to the integrity of data?
Masquerade Modification
Repudiation Snooping
Which RFC document includes a definition of security service?
RFC 2828 RFC 2401
RFC 3310 RFC 6600
Which of the following is a component of cryptography?
Ciphertext Ciphers
Key All of these
In public-key cryptography, key is used for encryption
Public Private
Both a and b Shared
There are encryption round in IDEA.
16 5
10 8
In asymmetric-key cryptography, how many keys are required for each
communicating party?
2 3
4 1
Which of the following services is not provided by digital signatures
directly?
Message authenticity Message Confidentiality
Message Integrity Nonrepudiation
Who issues PGP certificates?
ITU-T IEEE
IETF The users themselves
In which protocol is the payment gateway used?
SET PGP
TLS SSL
10) firewall is mostly used in small businesses.
Packet filtering Circuit-level gateway
Application level gateway None of these
Page 2 of 2
SLR-VG-227
State true or false: 04
The loss of integrity is the unauthorized modification of information.
Enveloped data is not the function of S/MIME.
SHA-1 length is 150 bit.
SET stands for Secure Electronic Transactions.
Q.2 Write short note. 08
Password protection approaches
Cryptanalysis
Answer the following: 06
How is the S-box constructed?
What does meant by a trusted system?
Q.3 Answer the following: 14
Explain various network security services.
Briefly explain the model for network security.
Q.4 Answer the following: 14
Explain DES with its structure. Also explain its function.
Explain the sub-key generation in the IDEA algorithm.
Q.5 Answer the following: 14
How does the PGP use the concept of trust and legitimacy?
Explain the S/MIME protocol.
Q.6 Answer the following: 14
What do you mean by the term intruder? Explain intrusion techniques in brief.
Explain any two approaches for intrusion detection.
Q.7 Answer the following: 14
What is key management? Also explain the function of key management.
Discuss the direct and arbitrated approaches for digital signature.


Other Question Papers

Subjects

  • .net technology
  • artifical intelligence
  • computer communication network
  • data mining and warehouse
  • data structures
  • dbms
  • digital image processing
  • distributed operating system
  • finite automata
  • internet of things
  • java programming
  • linux operating system (oet)
  • mobile computing
  • network security
  • numerical analysis
  • object oriented programming using c++
  • office automation (oet)
  • operating system
  • operations research
  • soft computing
  • software engineering
  • software testing
  • uml