Exam Details
Subject | network security | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | loyola college | |
Position | ||
Exam Date | April, 2018 | |
City, State | tamil nadu, chennai |
Question Paper
1
LOYOLA COLLEGE (AUTONOMOUS), CHENNAI 600 034
M.C.A.DEGREE EXAMINATION COMPUTER APPLICATIONS
FIFTHSEMESTER APRIL 2018
CA 5810- NETWORK SECURITY
Date: 20-04-2018 Dept. No. Max. 100 Marks
Time: 09:00-12:00
PART-A 10 x 2=20
Answer ALL the questions.
What is network security?
Mention the three aspects of network security.
What is vulnerability?
Differentiate spammer and phisher.
List the classic encryption techniques.
What is a brute force attack?
Name the modes of operation of block cipher.
What is DES?
Bring out the applications of IPSec.
10) What is VPN?
PART B 5 x 8=40
Answer ALL the questions.
11) Illustrate the model for network security.
Describe specific security mechanisms.
12) Give explanation on threats.
Explain reconnaissance attacks.
13) Describe steganography.
Elucidate IPSec.
14) Explain distribution of public keys.
Describe AES.
15) Elucidate types of firewall.
Explain key management in IPSec.
2
PART- C 2 x 20 40
Answer ANY TWO questions.
16) Give explanation on the security attacks.(10)
Explain vulnerabilities.
17) Explain the following:
Symmetric encryption.
Feistel cipher.
18) Describe the following:
Public key infrastructure.
IPSec protocols.
LOYOLA COLLEGE (AUTONOMOUS), CHENNAI 600 034
M.C.A.DEGREE EXAMINATION COMPUTER APPLICATIONS
FIFTHSEMESTER APRIL 2018
CA 5810- NETWORK SECURITY
Date: 20-04-2018 Dept. No. Max. 100 Marks
Time: 09:00-12:00
PART-A 10 x 2=20
Answer ALL the questions.
What is network security?
Mention the three aspects of network security.
What is vulnerability?
Differentiate spammer and phisher.
List the classic encryption techniques.
What is a brute force attack?
Name the modes of operation of block cipher.
What is DES?
Bring out the applications of IPSec.
10) What is VPN?
PART B 5 x 8=40
Answer ALL the questions.
11) Illustrate the model for network security.
Describe specific security mechanisms.
12) Give explanation on threats.
Explain reconnaissance attacks.
13) Describe steganography.
Elucidate IPSec.
14) Explain distribution of public keys.
Describe AES.
15) Elucidate types of firewall.
Explain key management in IPSec.
2
PART- C 2 x 20 40
Answer ANY TWO questions.
16) Give explanation on the security attacks.(10)
Explain vulnerabilities.
17) Explain the following:
Symmetric encryption.
Feistel cipher.
18) Describe the following:
Public key infrastructure.
IPSec protocols.
Other Question Papers
Subjects
- .net technologies for
- .net technologies for enterprise mobility
- .net technologies lab
- advanced java programming
- advanced java programming lab
- c++ and data structures lab
- cloud computing
- computer architecture and operating systems
- computer graphics and multimedia
- computer graphics and multimedia lab
- data communications and networking
- data mining
- data structures and algorithms
- database management systems
- database management systems lab
- discrete structures
- enterprise mobility
- free and open source software
- java programming
- java programming lab
- life skills training
- linux programming lab
- mobile computing
- net technologies
- network security
- network security lab
- object oriented programming through c++
- object-oriented software engineering
- open source web technologies
- principles of management accounting
- project work
- soft skills ii
- software development lab
- software project management
- software testing
- statistical methods for computer
- summer training programme
- technical writing
- xml and web services
- xml and web services lab