Exam Details
Subject | network security | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | June, 2017 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER V EXAMINATION SUMMER 2017
Subject Code: 650002 Date: 01/06/2017
Subject Name: Network Security
Time: 2:30 pm 5:00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Explain any 7 terms:
1. Data Integrity
2. Stream Cipher
3. CBC
4. Detached Signature
5. Forward Certificate
6. Session Key
7. Integrity Check value in IPsec
8. Subject with respect to trusted system
9. Honey pot
10. Tiny fragment attack
07
Explain Active and Passive attack in detail.
07
Q.2
1. Explain types of attack on encrypted message.
2. Give example of following
a. Replay attack
b. Encryption
04
03
Explain three approaches to message authentication.
07
OR
Why modes of operation are defined? Explain any three cipher block modes of operation.
07
Q.3
Briefly explain Diffie-Hellman key exchange. Justify that Diffie-Hellman is vulnerable to man in the middle attack.
07
Explain X.509 authentication procedures in detail.
07
OR
Q.3
1. What is HMAC? Why it is useful?
2. List the steps of RSA algorithm.
04
03
What is Kerberos realm? Write any four differences between Kerberos version 4 and version 5.
07
Q.4
Explain SSL architecture and SSL record protocol.
07
What is key ring in PGP? Briefly explain the structure indicating the different fields of private Key Ring in PGP.
07
OR
Q.4
1. Why web security is important issue today? List any four reasons for the same.
2. What does the Alert protocol do?
04
03
Briefly explain PGP services.
07
Q.5
1. Explain Anti-Replay service.
2. Write any three differences between Transport and Tunnel mode in IPsec.
04
03
2
Just by drawing schematic diagram, show how new password is loaded and existing password is verified in UNIX system.
07
OR
Q.5
1. Explain two rules of multilevel security.
2. Explain Trojan horse Defense.
02
05
What is IPsec? What are the applications of IPsec? Explain the modes of IPsec operations.
07
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER V EXAMINATION SUMMER 2017
Subject Code: 650002 Date: 01/06/2017
Subject Name: Network Security
Time: 2:30 pm 5:00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Explain any 7 terms:
1. Data Integrity
2. Stream Cipher
3. CBC
4. Detached Signature
5. Forward Certificate
6. Session Key
7. Integrity Check value in IPsec
8. Subject with respect to trusted system
9. Honey pot
10. Tiny fragment attack
07
Explain Active and Passive attack in detail.
07
Q.2
1. Explain types of attack on encrypted message.
2. Give example of following
a. Replay attack
b. Encryption
04
03
Explain three approaches to message authentication.
07
OR
Why modes of operation are defined? Explain any three cipher block modes of operation.
07
Q.3
Briefly explain Diffie-Hellman key exchange. Justify that Diffie-Hellman is vulnerable to man in the middle attack.
07
Explain X.509 authentication procedures in detail.
07
OR
Q.3
1. What is HMAC? Why it is useful?
2. List the steps of RSA algorithm.
04
03
What is Kerberos realm? Write any four differences between Kerberos version 4 and version 5.
07
Q.4
Explain SSL architecture and SSL record protocol.
07
What is key ring in PGP? Briefly explain the structure indicating the different fields of private Key Ring in PGP.
07
OR
Q.4
1. Why web security is important issue today? List any four reasons for the same.
2. What does the Alert protocol do?
04
03
Briefly explain PGP services.
07
Q.5
1. Explain Anti-Replay service.
2. Write any three differences between Transport and Tunnel mode in IPsec.
04
03
2
Just by drawing schematic diagram, show how new password is loaded and existing password is verified in UNIX system.
07
OR
Q.5
1. Explain two rules of multilevel security.
2. Explain Trojan horse Defense.
02
05
What is IPsec? What are the applications of IPsec? Explain the modes of IPsec operations.
07
Other Question Papers
Subjects
- advance database management system
- advanced biopharmaceutics & pharmacokinetics
- advanced medicinal chemistry
- advanced networking (an)
- advanced organic chemistry -i
- advanced pharmaceutical analysis
- advanced pharmacognosy-1
- advanced python
- android programming
- artificial intelligence (ai)
- basic computer science-1(applications of data structures and applications of sql)
- basic computer science-2(applications of operating systems and applications of systems software)
- basic computer science-3(computer networking)
- basic computer science-4(software engineering)
- basic mathematics
- basic statistics
- big data analytics (bda)
- big data tools (bdt)
- chemistry of natural products
- cloud computing (cc)
- communications skills (cs)
- computer aided drug delivery system
- computer graphics (cg)
- computer-oriented numerical methods (conm)
- cyber security & forensics (csf)
- data analytics with r
- data mining
- data structures (ds)
- data visualization (dv)
- data warehousing
- data warehousing & data mining
- database administration
- database management system (dbms)
- design & analysis of algorithms(daa)
- digital technology trends ( dtt)
- discrete mathematics for computer science (dmcs)
- distributed computing (dc1)
- drug delivery system
- dynamic html
- enterprise resource planning (erp)
- food analysis
- function programming with java
- fundamentals of computer organization (fco)
- fundamentals of java programming
- fundamentals of networking
- fundamentals of programming (fop)
- geographical information system
- image processing
- industrial pharmacognostical technology
- information retrieving (ir)
- information security
- java web technologies (jwt)
- language processing (lp)
- machine learning (ml)
- management information systems (mis)
- mobile computing
- molecular pharmaceutics(nano tech and targeted dds)
- network security
- object-oriented programming concepts & programmingoocp)
- object-oriented unified modelling
- operating systems
- operation research
- operations research (or)
- pharmaceutical validation
- phytochemistry
- procedure programming in sql
- programming skills-i (ps-i-fop)
- programming skills-ii (ps-oocp)
- programming with c++
- programming with java
- programming with linux, apache,mysql, and php (lamp)
- programming with python
- search engine techniques (set)
- soft computing
- software development for embedded systems
- software engineering
- software lab (dbms: sql & pl/sql)
- software project in c (sp-c)
- software project in c++ (sp-cpp)
- software quality and assurance (sqa)
- statistical methods
- structured & object oriented analysis& design methodology
- system software
- virtualization and application of cloud
- web commerce (wc)
- web data management (wdm)
- web searching technology and search engine optimization
- web technology & application development
- wireless communication & mobile computing (wcmc)
- wireless sensor network (wsn)