Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | April, 2017 | |
City, State | maharashtra, solapur |
Question Paper
MCA (Science) (Semester (CGPA) Examination, 2017
NETWORK SECURITY
Day Date: Saturday, 22-04-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instruction
Q. No.1 and 2 are compulsory.
Attempt any 3 questions from Q.No3 to Q.No.7.
Figure to the right indicates full marks.
Q.1 Choose the Correct Alternatives 10
IPSec is designed to provide the security at the
transport layer network layer
application layer session layer
One of protocols to provide security at application layer is
Pretty Good Privacy Handshake Protocol
Alert Protocol Record Protocol
Responsible for defining the overall architecture of the Internet,
providing guidance and broad direction to the IFTF
IESG IETF IAB None of these
A takes place when one entity pretends to be a different
entity.
masquerade Replay
Denial of service None of these
is the ability to limit and control the access to host systems
and applications via communications links.
authentication Access control
Data integrity Data confidentiality
The process of attempting to discover the plaintext or key is known
as
Cryptography Cryptology
Cryptodignosis Cryptanalysis
A processes the input one block of elements at a time,
producing an output block for each input block.
Block cipher Stream cipher
Chain cipher None of these
attacks involve some modification of the data stream or the
creation of a false stream.
Page 2 of 2
Passive Negative Active None of these
software that is intentionally included or inserted in a
system for harmful purpose.
Virus Worm
Malicious software None of these
10) A virus attaches itself to executable files and replicates,
when the infected program is executed, by finding other executable
files to infect.
Parasitic Memory-resident
Boot sector Stealth
State whether the following statements are true or false: 04
Intrusion detection involves detecting unusual patterns of activity or
patterns of activity that are known to correlate with instrusion.
PGP incorporates tools for developing a private-key trust model and
private-key certificate management.
Plaintext is the scrambled message produced as output
A polymorphic virus creates copies during replication that are
functionally equivalent but have distinctly different bit patterns.
Q.2 Write short notes on the following: 08
Internet security protocol
Software firewall
Answer the following: 06
What is Encryption algorithm? Explain in short.
What is Non-repudiation? Explain it
Q.3 Attempt the following questions: 14
What is the difference between a block cipher Steam cipher? Explain
with examples.
What is Attack? Explain types of passive attacks.
Q.4 Attempt the following questions: 14
What is Access Matrix? Explain Access control model.
What is digital signature? Explain its importance with example.
Q.5 Attempt the following questions: 14
Explain various objectives of Network security.
What smart card? Explain the advantages of smart card.
Q.6 Attempt the following questions: 14
What is Intruder? Explain types of intruders.
What is PGP? Explain application area of PGP.
Q.7 Attempt the following questions: 14
Explain the architecture of Secure Socket Layer with its
applications.
What is firewall? Explain general techniques of firewall is use to control
access.
NETWORK SECURITY
Day Date: Saturday, 22-04-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instruction
Q. No.1 and 2 are compulsory.
Attempt any 3 questions from Q.No3 to Q.No.7.
Figure to the right indicates full marks.
Q.1 Choose the Correct Alternatives 10
IPSec is designed to provide the security at the
transport layer network layer
application layer session layer
One of protocols to provide security at application layer is
Pretty Good Privacy Handshake Protocol
Alert Protocol Record Protocol
Responsible for defining the overall architecture of the Internet,
providing guidance and broad direction to the IFTF
IESG IETF IAB None of these
A takes place when one entity pretends to be a different
entity.
masquerade Replay
Denial of service None of these
is the ability to limit and control the access to host systems
and applications via communications links.
authentication Access control
Data integrity Data confidentiality
The process of attempting to discover the plaintext or key is known
as
Cryptography Cryptology
Cryptodignosis Cryptanalysis
A processes the input one block of elements at a time,
producing an output block for each input block.
Block cipher Stream cipher
Chain cipher None of these
attacks involve some modification of the data stream or the
creation of a false stream.
Page 2 of 2
Passive Negative Active None of these
software that is intentionally included or inserted in a
system for harmful purpose.
Virus Worm
Malicious software None of these
10) A virus attaches itself to executable files and replicates,
when the infected program is executed, by finding other executable
files to infect.
Parasitic Memory-resident
Boot sector Stealth
State whether the following statements are true or false: 04
Intrusion detection involves detecting unusual patterns of activity or
patterns of activity that are known to correlate with instrusion.
PGP incorporates tools for developing a private-key trust model and
private-key certificate management.
Plaintext is the scrambled message produced as output
A polymorphic virus creates copies during replication that are
functionally equivalent but have distinctly different bit patterns.
Q.2 Write short notes on the following: 08
Internet security protocol
Software firewall
Answer the following: 06
What is Encryption algorithm? Explain in short.
What is Non-repudiation? Explain it
Q.3 Attempt the following questions: 14
What is the difference between a block cipher Steam cipher? Explain
with examples.
What is Attack? Explain types of passive attacks.
Q.4 Attempt the following questions: 14
What is Access Matrix? Explain Access control model.
What is digital signature? Explain its importance with example.
Q.5 Attempt the following questions: 14
Explain various objectives of Network security.
What smart card? Explain the advantages of smart card.
Q.6 Attempt the following questions: 14
What is Intruder? Explain types of intruders.
What is PGP? Explain application area of PGP.
Q.7 Attempt the following questions: 14
Explain the architecture of Secure Socket Layer with its
applications.
What is firewall? Explain general techniques of firewall is use to control
access.
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology