Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | November, 2017 | |
City, State | maharashtra, solapur |
Question Paper
M.C.A. (Semester- (CBCS)Examination Oct/Nov-2017
Science
NETWORK SECURITY
Day Date: Tuesday, 21-11-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instructions: Q.1 and Q.2 are compulsory.
Attempt any Three Questions from Q.3 to Q.7
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives 10
Data Encryption Standard as designed by
Microsoft Apple
IBM None of these
In this case only the digital signature is encoded using base 64.
Enveloped data Signed data
Clear signed data None of these
Responsible for defining the overall architecture of the Internet,
providing guidance and broad direction to the IETF
IAB IETF
IESG None of these
A involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
Masquerade Replay
Denial of service None of these
The service is concerned with assuring that a
communication is authentic.
Authentication Access control
Data integrity None of these
is the original massage pr data that is fed into the
algorithm as input.
Secret key Cipher text
Cryptanalysis Plaint text
A processes the input elements continuously, producing
output one element at a time, as it goes along.
Chain cipher Block cipher
Stream cipher None of these
is an open source freely available software package for
e-mail security.
PGP ESP
CGP None of these
A is a program that can replicate itself and send copies
from computer to computer across network connections.
Malicious software Virus
Worm None of these
Page 2 of 2
SLR-SM-45
10) A form of virus explicitly designed to hide itself from detection by
antivirus software.
Parasitic virus Memory-resident
Boot sector virus Stealth virus
State True of False 04
Unauthorized intrusion into a computer system or network is one of
the most serious threats to computer security.
The denial of service takes place one entity pretends to be a
different entity.
Macro viruses infect documents, not executable portions of code.
The authentication service is concerned with assuring that a
communication is authentic.
Q2 Write a short note on following: 08
Authentication
Proxy servers
Answer the following: 06
What is Cryptanalysis? Explain in short
What is Data Integrity?
Q3 Attempt the following questions: 14
Explain the procedure for IDEA algorithm.
Explain various security services in detail.
Q4 Attempt the following questions: 14
Explain the features of Chinese wall.
What is digital signature? How it is useful? Explain in detail.
Q5 Attempt the following questions: 14
Explain Internet Protocol in detail.
What is Biometric? Explain behavioural characteristics of individuals in
biometric.
Q6 Attempt the following questions: 14
What is Packet Filtering? Explain in detail.
What is PGP? Explain the importance of PGP in detail.
Q7 Attempt the following questions: 14
What is firewall? Explain general techniques of firewall which is use to
control access?
What are the business requirements of Secure Electronic Transaction
Explain it.
Science
NETWORK SECURITY
Day Date: Tuesday, 21-11-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instructions: Q.1 and Q.2 are compulsory.
Attempt any Three Questions from Q.3 to Q.7
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives 10
Data Encryption Standard as designed by
Microsoft Apple
IBM None of these
In this case only the digital signature is encoded using base 64.
Enveloped data Signed data
Clear signed data None of these
Responsible for defining the overall architecture of the Internet,
providing guidance and broad direction to the IETF
IAB IETF
IESG None of these
A involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
Masquerade Replay
Denial of service None of these
The service is concerned with assuring that a
communication is authentic.
Authentication Access control
Data integrity None of these
is the original massage pr data that is fed into the
algorithm as input.
Secret key Cipher text
Cryptanalysis Plaint text
A processes the input elements continuously, producing
output one element at a time, as it goes along.
Chain cipher Block cipher
Stream cipher None of these
is an open source freely available software package for
e-mail security.
PGP ESP
CGP None of these
A is a program that can replicate itself and send copies
from computer to computer across network connections.
Malicious software Virus
Worm None of these
Page 2 of 2
SLR-SM-45
10) A form of virus explicitly designed to hide itself from detection by
antivirus software.
Parasitic virus Memory-resident
Boot sector virus Stealth virus
State True of False 04
Unauthorized intrusion into a computer system or network is one of
the most serious threats to computer security.
The denial of service takes place one entity pretends to be a
different entity.
Macro viruses infect documents, not executable portions of code.
The authentication service is concerned with assuring that a
communication is authentic.
Q2 Write a short note on following: 08
Authentication
Proxy servers
Answer the following: 06
What is Cryptanalysis? Explain in short
What is Data Integrity?
Q3 Attempt the following questions: 14
Explain the procedure for IDEA algorithm.
Explain various security services in detail.
Q4 Attempt the following questions: 14
Explain the features of Chinese wall.
What is digital signature? How it is useful? Explain in detail.
Q5 Attempt the following questions: 14
Explain Internet Protocol in detail.
What is Biometric? Explain behavioural characteristics of individuals in
biometric.
Q6 Attempt the following questions: 14
What is Packet Filtering? Explain in detail.
What is PGP? Explain the importance of PGP in detail.
Q7 Attempt the following questions: 14
What is firewall? Explain general techniques of firewall which is use to
control access?
What are the business requirements of Secure Electronic Transaction
Explain it.
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology