Exam Details

Subject network security
Paper
Exam / Course mca
Department
Organization Gujarat Technological University
Position
Exam Date May, 2019
City, State gujarat, ahmedabad


Question Paper

1
Seat No.: Enrolment
GUJARAT TECHNOLOGICAL UNIVERSITY
MCA- SEMESTER EXAMINATION -SUMMER-2019
Subject Code: 2650002 Date: 04-05-2019
Subject Name: Network Security
Time: 10.30 am to 1.00 pm Total Marks: 70
Instructions:
1. Attempt all questions.
2. Make Suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
Q.1

Answers the following:
1. Give one major difference between a passive and an active attack.
2. What is a clear signed message in SMIME?
3. What do you mean by Certificate Revocation?
4. Differentiate Transport and Tunnel Mode in IPSec.
5. Explain Access control?
6. Write name of any two Symmetric Cipher algorithms.
7. Explain Data Authentication.
07

Fill in the blanks
1. The two types of operation used for transforming plain text to cipher text are and
2. Hash function produces a output for input.
3. Kerberos server consists of two server and
4. Size of fragment in SSL record protocol is
5. The PGP message encryption algorithms are and
6. Full form of ESP is
7. In Anti-Replay service TCP sequence numbers are between to
07
Q.2

Write any one type/example of following:
1. Active attack
2. Digital Signature generation algorithm
3. Alert message in SSL
4. Public key encryption algorithm
5. Cryptanalysis attack
6. Key exchange
7. Subject name in X.509 certificate
07

1. Mention and very briefly explain any five fields/elements of the format of X.509 Public Key Certificate.
2. Compare DES, 3DES and AES.
05
02
OR

Attempt any two
1. Explain three different ways to secure the web traffic using different layers.
2. Explain: Rule and statistical anomaly based Intrusion Detection.
3. Write at least four important differences between a block and a stream cipher
07
2
Q.3

1. Explain PGP Services Authentication and confidentiality with suitable diagram.
2. Write any two advantages of counter mode.
05
02

1. Write any four important differences between Kerberos version 4 and 5.
2. What is the need for using both, symmetric and asymmetric keys in construction of Enveloped Data?
04
03
OR
Q.3

Briefly explain the structure/format indicating the different fields of Public Key Ring in PGP.
07

Attempt any two
1. Explain SSL record Protocol in Detail.
2. Explain IP spoofing and tiny fragment attack with respect to packet filter firewall.
3. Why compression is applied before encryption and after authentication in PGP?
07
Q.4

1. Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length.
2. Write any three differences between SSL and TLS.
04
03

1. How Man-in-Middle attack performed in Diffie Hellman key exchange.
2. What is the role of function in TLS?
04
03
OR
Q.4

What is IPSec? What are the applications of IPSec? Explain the modes of IPSec operations.
07

Attempt any two
1. Why web security is more important issue today? List at least four reasons for the same.
2. Write any three differences between WAP and HTML.
3. Differentiate between forward and backward certificates. And explain the role of CA in PKIX.
07
Q.5

1. Explain the five ingredients of symmetric encryption.
2. Write the name of two cipher based MAC.
05
02

1. Explain: HMAC with suitable Diagram.
2. Write the phases of Handshake Protocol.
04
03
OR
Q.5

1. Explain MIME content type Multipart along with its subtype.
2. Write any three routing applications of IPSec.
04
03

Attempt any two
1. Write the steps used in AES algorithm.
2. Explain the stages of Virus.
3. Write how outbound traffic is processed with the first packet on a new secure connection in IPsec.
07



Other Question Papers

Subjects

  • advance database management system
  • advanced biopharmaceutics & pharmacokinetics
  • advanced medicinal chemistry
  • advanced networking (an)
  • advanced organic chemistry -i
  • advanced pharmaceutical analysis
  • advanced pharmacognosy-1
  • advanced python
  • android programming
  • artificial intelligence (ai)
  • basic computer science-1(applications of data structures and applications of sql)
  • basic computer science-2(applications of operating systems and applications of systems software)
  • basic computer science-3(computer networking)
  • basic computer science-4(software engineering)
  • basic mathematics
  • basic statistics
  • big data analytics (bda)
  • big data tools (bdt)
  • chemistry of natural products
  • cloud computing (cc)
  • communications skills (cs)
  • computer aided drug delivery system
  • computer graphics (cg)
  • computer-oriented numerical methods (conm)
  • cyber security & forensics (csf)
  • data analytics with r
  • data mining
  • data structures (ds)
  • data visualization (dv)
  • data warehousing
  • data warehousing & data mining
  • database administration
  • database management system (dbms)
  • design & analysis of algorithms(daa)
  • digital technology trends ( dtt)
  • discrete mathematics for computer science (dmcs)
  • distributed computing (dc1)
  • drug delivery system
  • dynamic html
  • enterprise resource planning (erp)
  • food analysis
  • function programming with java
  • fundamentals of computer organization (fco)
  • fundamentals of java programming
  • fundamentals of networking
  • fundamentals of programming (fop)
  • geographical information system
  • image processing
  • industrial pharmacognostical technology
  • information retrieving (ir)
  • information security
  • java web technologies (jwt)
  • language processing (lp)
  • machine learning (ml)
  • management information systems (mis)
  • mobile computing
  • molecular pharmaceutics(nano tech and targeted dds)
  • network security
  • object-oriented programming concepts & programmingoocp)
  • object-oriented unified modelling
  • operating systems
  • operation research
  • operations research (or)
  • pharmaceutical validation
  • phytochemistry
  • procedure programming in sql
  • programming skills-i (ps-i-fop)
  • programming skills-ii (ps-oocp)
  • programming with c++
  • programming with java
  • programming with linux, apache,mysql, and php (lamp)
  • programming with python
  • search engine techniques (set)
  • soft computing
  • software development for embedded systems
  • software engineering
  • software lab (dbms: sql & pl/sql)
  • software project in c (sp-c)
  • software project in c++ (sp-cpp)
  • software quality and assurance (sqa)
  • statistical methods
  • structured & object oriented analysis& design methodology
  • system software
  • virtualization and application of cloud
  • web commerce (wc)
  • web data management (wdm)
  • web searching technology and search engine optimization
  • web technology & application development
  • wireless communication & mobile computing (wcmc)
  • wireless sensor network (wsn)