Exam Details
Subject | information security | |
Paper | ||
Exam / Course | ||
Department | electronics & information technology | |
Organization | National Institute Of Electronics & Information Technology | |
Position | ||
Exam Date | July, 2016 | |
City, State | delhi, dwarka |
Question Paper
C8-R4 Page 1 of 1 July, 2016
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Define Cryptanalysis, Cryptanalyst, Cryptology and Cryptosystem?
Differentiate between an unconditionally secure cipher and a computationally secure cipher?
List and briefly define categories of Cyber security services.
Explain any substitution techniques for cryptography.
List and briefly define categories of Cyber security mechanisms.
Why is SSL important?
Mention some of the properties of Digital Signatures?
2.
Discuss RSA algorithm in detail.
Explain the Diffie-Hellmen Key exchange algorithm.
What is man in the middle attack and meet in the middle attack on double encryption?
3.
What is the significance of hash functions w.r.t cryptography?
What is Message Authentication Code Explain in brief.
4.
Explain SNMP Protocol in detail.
What are web security threats? Give countermeasures of web security threats. What is
difference between HTTP and HTTPS protocol?
5.
Explain PGP for e-mail security.
Describe S/MIME.
6.
What is IPSec Protocol? Explain in detail with operation mode and its application. Draw frame
format of IPSec also.
What is firewall? Explain different types of firewall.
7. Differentiate between any three of the following:
Direct Digital Signatures and Arbitrated Digital Signatures
Diffusion and Confusion
Block Cipher and Stream Cipher
Hash and Message Authentication Code
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.
C8-R4: INFORMATION SECURITY
NOTE:
Time: 3 Hours Total Marks: 100
1.
Define Cryptanalysis, Cryptanalyst, Cryptology and Cryptosystem?
Differentiate between an unconditionally secure cipher and a computationally secure cipher?
List and briefly define categories of Cyber security services.
Explain any substitution techniques for cryptography.
List and briefly define categories of Cyber security mechanisms.
Why is SSL important?
Mention some of the properties of Digital Signatures?
2.
Discuss RSA algorithm in detail.
Explain the Diffie-Hellmen Key exchange algorithm.
What is man in the middle attack and meet in the middle attack on double encryption?
3.
What is the significance of hash functions w.r.t cryptography?
What is Message Authentication Code Explain in brief.
4.
Explain SNMP Protocol in detail.
What are web security threats? Give countermeasures of web security threats. What is
difference between HTTP and HTTPS protocol?
5.
Explain PGP for e-mail security.
Describe S/MIME.
6.
What is IPSec Protocol? Explain in detail with operation mode and its application. Draw frame
format of IPSec also.
What is firewall? Explain different types of firewall.
7. Differentiate between any three of the following:
Direct Digital Signatures and Arbitrated Digital Signatures
Diffusion and Confusion
Block Cipher and Stream Cipher
Hash and Message Authentication Code
1. Answer question 1 and any FOUR from questions 2 to 7.
2. Parts of the same question should be answered together and in the same
sequence.
Other Question Papers
Departments
- electronics & information technology
Subjects
- accounting & financial management system
- advanced algorithms
- advanced computer graphics
- advanced computer networks
- application of .net technology
- applied operations research
- artificial intelligence & neural networks
- automata theory & compiler design
- basic mathematics
- basics of os, unix & shell programming
- basics of os, unix and shell programming
- computer based statistical & numerical methods
- computer graphics & multimedia
- computer system architecture
- cyber forensic & law
- data communication and network technologies
- data communication and network technologies
- data network and management
- data structure through c++
- data structure through java
- data structures through ‘c++’
- data warehouse and data mining
- data warehousing and data mining
- digital image processing
- digital image processing and computer visio
- digital signal processing
- discrete structures
- e-business
- elements of mathematical sciences
- embedded systems
- graphics and visualisation
- image processing and computer vision
- information security
- information storage & management
- internet technology and web design
- internet technology and web design
- internet technology and web services
- introduction to database management system
- introduction to dbms
- introduction to ict resources
- introduction to multimedia
- introduction to object oriented programming through java
- introduction to object-oriented programming through java
- it tools and business system
- it tools and business systems
- machine learning
- management fundamentals & information systems
- mathematical methods for computing
- mobile computing
- multimedia systems
- multimedia systems
- network management & information security
- object oriented database management systems
- operating system
- operating systems
- parallel computing
- professional & business communication
- programming and problem solving through ‘c’ language
- programming and problem solving through ‘c’ language
- project management
- soft computing
- software engineering and case tools
- software project management
- software systems
- software testing and quality management
- software testing and quality management
- structured system analysis & design
- structured system analysis and design
- system modeling & computer simulation
- visual programming
- wireless & mobile communication