Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.computer applications | |
Department | ||
Organization | loyola college (autonomous) chennai – 600 034 | |
Position | ||
Exam Date | November, 2017 | |
City, State | tamil nadu, chennai |
Question Paper
1
LOYOLA COLLEGE (AUTONOMOUS), CHENNAI 600 034
M.C.A. DEGREE EXAMINATION COMPUTER APPLICATIONS
FIFTH SEMESTER NOVEMBER 2017
CA 5810 NETWORK SECURITY
Date: 08-11-2017 Dept. No. Max. 100 Marks
Time: 09:00-12:00
PART-A
Answer ALL the questions 10 x 2=20
How do IETF and ITU-T publish their recommendations?
What is non-repudiation?
Mention the different ways of making revenue out of finding vulnerabilities.
What is smurf attack?
Name the approaches to attacking conventional encryption scheme.
What is unconditional and computational security?
Compare and contrast Hash and MAC.
What is Kerberos?
Name the types of firewalls.
10) Mention the three subsets of packet filtering firewalls.
PART B
Answer ALL the questions 5 x 8=40
11) Explain specific and pervasive mechanisms.
Give explanation on security attacks.
12) Explain Vulnerability.
Give a brief description on security threats.
13) Describe Caesar cipher.
Describe the types of cryptanalytic attacks.
14) Explain PKIX model with a diagram.
Elucidate SHA-512 with a neat diagram.
15) Explain ESP and AH protocols.
Describe Oakley and ISAKMP.
PART- C
Answer ANY TWO questions 2 x 20 40
16) Give explanation on X.800 security services.(10)
Describe reconnaissance attacks.
17) Explain the following:
Playfair cipher.(10)
Authentication applications.
18) Elucidate the following:
DES.(10)
IPSec logical architecture.
LOYOLA COLLEGE (AUTONOMOUS), CHENNAI 600 034
M.C.A. DEGREE EXAMINATION COMPUTER APPLICATIONS
FIFTH SEMESTER NOVEMBER 2017
CA 5810 NETWORK SECURITY
Date: 08-11-2017 Dept. No. Max. 100 Marks
Time: 09:00-12:00
PART-A
Answer ALL the questions 10 x 2=20
How do IETF and ITU-T publish their recommendations?
What is non-repudiation?
Mention the different ways of making revenue out of finding vulnerabilities.
What is smurf attack?
Name the approaches to attacking conventional encryption scheme.
What is unconditional and computational security?
Compare and contrast Hash and MAC.
What is Kerberos?
Name the types of firewalls.
10) Mention the three subsets of packet filtering firewalls.
PART B
Answer ALL the questions 5 x 8=40
11) Explain specific and pervasive mechanisms.
Give explanation on security attacks.
12) Explain Vulnerability.
Give a brief description on security threats.
13) Describe Caesar cipher.
Describe the types of cryptanalytic attacks.
14) Explain PKIX model with a diagram.
Elucidate SHA-512 with a neat diagram.
15) Explain ESP and AH protocols.
Describe Oakley and ISAKMP.
PART- C
Answer ANY TWO questions 2 x 20 40
16) Give explanation on X.800 security services.(10)
Describe reconnaissance attacks.
17) Explain the following:
Playfair cipher.(10)
Authentication applications.
18) Elucidate the following:
DES.(10)
IPSec logical architecture.
Other Question Papers
Subjects
- .net technologies
- .net technologies lab
- advanced .net
- advanced java
- c++ and data structures lab
- cloud computing
- computer graphics and multimedia applications
- computer graphics and multimedia lab
- computer organization and architecture
- data communication and networks
- data mining
- database administration
- database management systems
- database management systems lab
- discrete structures
- free and open source software development
- it infracture management
- java programming lab
- knowledge management system andapplications
- microprocessor and its applications
- mobile computing
- network administration
- network security
- network security lab
- neural networks using matlab
- neural networks using matlab lab
- object-oriented software engineering
- operating systems
- programming and data structures through c++
- programming with java
- resource management techniques
- software development lab
- software project management
- software testing
- statistical methods for computer applications
- unix programming lab
- xml and web services
- xml and web services lab