Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | 22, April, 2017 | |
City, State | maharashtra, solapur |
Question Paper
MCA (Science) (Semester (CGPA) Examination, 2017
NETWORK SECURITY
iI
Day Date: Saturday, 22-04-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
N.B. Q.1 and Q.2 are compulsory.
Attempt any three questions from Q. no. 3 to Q. no. 7.
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives. 10
SSL is designed to provide security and compression services to
data generated from
Data link Network Application Transport
The cryptography algorithms used in S MIME are
IDEA RC4 RSA, DES-3 RC5
are very difficult to detect because they do not
involve any alteration of data.
Active attack Passive attack
Null attack None
The process to discover plain text or key is known as
Cryptanalysis Cryptodesign
Crypto processing Cryptographic
Pretty Good privacy is used in
Browser security E-mail security
FTP security None of these
DES involves the following block cipher technique.
ECB RSA CBC SHA 1
are very crucial for success of RSA algorithm.
Integers Prime numbers
Negative number Fraction
The or inhibits the normal use or management
of communications facilities.
Masquerade Replay
Modification of messages Denial of service
DES was devised by
Intel IBM Sun Microsoft
Page 2 of 2
10) transport mode protects the information coming from the
transport layer.
SSL TLS IPSec IDEA
State true or false. 04
SSL provides only authentication.
Integrity is the protection of transmitted data from passive
attacks.
Nonrepudiation is concerned with assuring that a communication
is authentic.
The letters of plaintext are replaced by other letters or by
numbers or symbols in substitution cipher.
Q.2 Write short notes on: 08
Intruders
Confidentially
Answer the following. 06
Explain Encapsulating Security Payload.
Explain common techniques for guessing password.
Q.3 Explain clerk-Wilson model in detail. 08
Explain triple DES in detail. 06
Q.4 Explain S MME in detail. 08
Which are the various types of firewall? Explain in short. 06
Q.5 Explain the features of digital signature with example. 08
Explain rule based intrusion detection method. 06
Q.6 Define Access Matrix. Explain Access Control Model. 08
Explain smart card in detail. 06
Q.7 Explain network security model in detail. 08
Explain packet filter firewall. 06
NETWORK SECURITY
iI
Day Date: Saturday, 22-04-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
N.B. Q.1 and Q.2 are compulsory.
Attempt any three questions from Q. no. 3 to Q. no. 7.
Figures to the right indicate full marks.
Q.1 Choose the correct alternatives. 10
SSL is designed to provide security and compression services to
data generated from
Data link Network Application Transport
The cryptography algorithms used in S MIME are
IDEA RC4 RSA, DES-3 RC5
are very difficult to detect because they do not
involve any alteration of data.
Active attack Passive attack
Null attack None
The process to discover plain text or key is known as
Cryptanalysis Cryptodesign
Crypto processing Cryptographic
Pretty Good privacy is used in
Browser security E-mail security
FTP security None of these
DES involves the following block cipher technique.
ECB RSA CBC SHA 1
are very crucial for success of RSA algorithm.
Integers Prime numbers
Negative number Fraction
The or inhibits the normal use or management
of communications facilities.
Masquerade Replay
Modification of messages Denial of service
DES was devised by
Intel IBM Sun Microsoft
Page 2 of 2
10) transport mode protects the information coming from the
transport layer.
SSL TLS IPSec IDEA
State true or false. 04
SSL provides only authentication.
Integrity is the protection of transmitted data from passive
attacks.
Nonrepudiation is concerned with assuring that a communication
is authentic.
The letters of plaintext are replaced by other letters or by
numbers or symbols in substitution cipher.
Q.2 Write short notes on: 08
Intruders
Confidentially
Answer the following. 06
Explain Encapsulating Security Payload.
Explain common techniques for guessing password.
Q.3 Explain clerk-Wilson model in detail. 08
Explain triple DES in detail. 06
Q.4 Explain S MME in detail. 08
Which are the various types of firewall? Explain in short. 06
Q.5 Explain the features of digital signature with example. 08
Explain rule based intrusion detection method. 06
Q.6 Define Access Matrix. Explain Access Control Model. 08
Explain smart card in detail. 06
Q.7 Explain network security model in detail. 08
Explain packet filter firewall. 06
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology