Exam Details
Subject | network security | |
Paper | ||
Exam / Course | mca | |
Department | ||
Organization | Gujarat Technological University | |
Position | ||
Exam Date | June, 2017 | |
City, State | gujarat, ahmedabad |
Question Paper
1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- V• EXAMINATION SUMMER • 2017
Subject Code: 2650002 Date:01/06/2017
Subject Name: Network Security
Time: 02:30 pm to 05:00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Attempt the following
1. What is data confidentiality?
2. Difference between passive and active attack.
3. Define MAC?
4. Define digital signature.
5. What are the two basic functions used in encryption algorithms?
6. What is the difference between a block cipher and a stream cipher?
7. What is firewall?
8. What is the difference between internal and external firewall?
9. What is salt in the context of Unix password management?
10. What is honeypot?
11. What is IP address spoofing?
12. What is the difference between SSL connection and SSL session?
13. Function of authentication server in Kerberos?
14. Give difference between signed data and clear signed data function of S/MIME.
14
Q.2
Describe stream generation in variable key-size stream cipher with byte-oriented operations algorithm.
07
Explain RSA and Perform encryption for plain text N using RSA algorithm with p=3 q=11 e=7 and N=33.
07
OR
Users A and B use the Diffie Hellman key exchange technique a
common prime q=23 and a primitive root alpha=11.
1. If user A has private key XA what is public key YA?
2. If user B has private key XB what is public key YB?
3. How man in middle attack can be performed in Diffi Hellman algorithm?
07
Q.3
Explain how the messages are generated and received by PGP.
07
Explain public key infrastructure.
07
OR
Q.3
Explain three requirements with respect to different keys use by PGP.
07
List requirements of hash function.
07
Q.4
1. Write a short note on anti reply window.
04
2. Draw diagram of HMAC.
03
1. Explain client hello message of handshake protocol.
04
2. Explain key and policy information category of extension field in X.509 version 3.
03
OR
Q.4
List IEEE 802.11i phases of operation. And explain key management phase in detail.
07
2
1. Explain the major elements of the WAE model.
04
2. Explain field of detection specific audit record developed by Dorothy denning.
03
Q.5
1. List requirements not satisfied by X.509 version 2.
04
2. Draw a diagram which gives the overview of KERBEROS.
03
1. Explain any one technique for developing an effective and efficient proactive password checker.
04
2. Give difference between transport mode and tunnel mode.
03
OR
Q.5
1. Explain process for inbound packet in IPsec.
04
2. Mention purpose of padding in ESP.
03
1. Lists four general techniques that firewalls use to control access and
enforce the site's security policy.
04
2. What are the default policies uses by packet filter firewall? And also explain below rule set.
Rule Set
Action
Src
Port
Dest
Port
Flag
allow
{our host}
25
allow
25
ACK
03
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA SEMESTER- V• EXAMINATION SUMMER • 2017
Subject Code: 2650002 Date:01/06/2017
Subject Name: Network Security
Time: 02:30 pm to 05:00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1
Attempt the following
1. What is data confidentiality?
2. Difference between passive and active attack.
3. Define MAC?
4. Define digital signature.
5. What are the two basic functions used in encryption algorithms?
6. What is the difference between a block cipher and a stream cipher?
7. What is firewall?
8. What is the difference between internal and external firewall?
9. What is salt in the context of Unix password management?
10. What is honeypot?
11. What is IP address spoofing?
12. What is the difference between SSL connection and SSL session?
13. Function of authentication server in Kerberos?
14. Give difference between signed data and clear signed data function of S/MIME.
14
Q.2
Describe stream generation in variable key-size stream cipher with byte-oriented operations algorithm.
07
Explain RSA and Perform encryption for plain text N using RSA algorithm with p=3 q=11 e=7 and N=33.
07
OR
Users A and B use the Diffie Hellman key exchange technique a
common prime q=23 and a primitive root alpha=11.
1. If user A has private key XA what is public key YA?
2. If user B has private key XB what is public key YB?
3. How man in middle attack can be performed in Diffi Hellman algorithm?
07
Q.3
Explain how the messages are generated and received by PGP.
07
Explain public key infrastructure.
07
OR
Q.3
Explain three requirements with respect to different keys use by PGP.
07
List requirements of hash function.
07
Q.4
1. Write a short note on anti reply window.
04
2. Draw diagram of HMAC.
03
1. Explain client hello message of handshake protocol.
04
2. Explain key and policy information category of extension field in X.509 version 3.
03
OR
Q.4
List IEEE 802.11i phases of operation. And explain key management phase in detail.
07
2
1. Explain the major elements of the WAE model.
04
2. Explain field of detection specific audit record developed by Dorothy denning.
03
Q.5
1. List requirements not satisfied by X.509 version 2.
04
2. Draw a diagram which gives the overview of KERBEROS.
03
1. Explain any one technique for developing an effective and efficient proactive password checker.
04
2. Give difference between transport mode and tunnel mode.
03
OR
Q.5
1. Explain process for inbound packet in IPsec.
04
2. Mention purpose of padding in ESP.
03
1. Lists four general techniques that firewalls use to control access and
enforce the site's security policy.
04
2. What are the default policies uses by packet filter firewall? And also explain below rule set.
Rule Set
Action
Src
Port
Dest
Port
Flag
allow
{our host}
25
allow
25
ACK
03
Other Question Papers
Subjects
- advance database management system
- advanced biopharmaceutics & pharmacokinetics
- advanced medicinal chemistry
- advanced networking (an)
- advanced organic chemistry -i
- advanced pharmaceutical analysis
- advanced pharmacognosy-1
- advanced python
- android programming
- artificial intelligence (ai)
- basic computer science-1(applications of data structures and applications of sql)
- basic computer science-2(applications of operating systems and applications of systems software)
- basic computer science-3(computer networking)
- basic computer science-4(software engineering)
- basic mathematics
- basic statistics
- big data analytics (bda)
- big data tools (bdt)
- chemistry of natural products
- cloud computing (cc)
- communications skills (cs)
- computer aided drug delivery system
- computer graphics (cg)
- computer-oriented numerical methods (conm)
- cyber security & forensics (csf)
- data analytics with r
- data mining
- data structures (ds)
- data visualization (dv)
- data warehousing
- data warehousing & data mining
- database administration
- database management system (dbms)
- design & analysis of algorithms(daa)
- digital technology trends ( dtt)
- discrete mathematics for computer science (dmcs)
- distributed computing (dc1)
- drug delivery system
- dynamic html
- enterprise resource planning (erp)
- food analysis
- function programming with java
- fundamentals of computer organization (fco)
- fundamentals of java programming
- fundamentals of networking
- fundamentals of programming (fop)
- geographical information system
- image processing
- industrial pharmacognostical technology
- information retrieving (ir)
- information security
- java web technologies (jwt)
- language processing (lp)
- machine learning (ml)
- management information systems (mis)
- mobile computing
- molecular pharmaceutics(nano tech and targeted dds)
- network security
- object-oriented programming concepts & programmingoocp)
- object-oriented unified modelling
- operating systems
- operation research
- operations research (or)
- pharmaceutical validation
- phytochemistry
- procedure programming in sql
- programming skills-i (ps-i-fop)
- programming skills-ii (ps-oocp)
- programming with c++
- programming with java
- programming with linux, apache,mysql, and php (lamp)
- programming with python
- search engine techniques (set)
- soft computing
- software development for embedded systems
- software engineering
- software lab (dbms: sql & pl/sql)
- software project in c (sp-c)
- software project in c++ (sp-cpp)
- software quality and assurance (sqa)
- statistical methods
- structured & object oriented analysis& design methodology
- system software
- virtualization and application of cloud
- web commerce (wc)
- web data management (wdm)
- web searching technology and search engine optimization
- web technology & application development
- wireless communication & mobile computing (wcmc)
- wireless sensor network (wsn)