Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | November, 2016 | |
City, State | maharashtra, solapur |
Question Paper
Master of Computer Application III (Science)
Examination: Oct Nov 2016 Semester V (New CGPA)
SLR No. Day
Date Time Subject Name Paper
No. Seat No.
SLR U
38
Monday
21/11/2016
10.30 AM
to
01.00 PM
Network Security
C
Instructions: Question no. 1 2 are compulsory
Attempt any three questions from Q. No. 3 to Q. No. 7
Figures to the right indicate full marks.
Total Marks: 70
Q.1 Choose the correct alternatives 10
Pretty good privacy is used in
Browser security Email security
FTP security None of these
This consist of encrypted content of any type and encrypted content
encryption keys for one or more recipients
Enveloped data Signed data
Clear-singed data None of these
responsible for technical management of IEFT activities and
the Internet standard process.
IAB IETF
IESG None of these
A prevents or inhibits the normal use or management of
communications facilities.
Masquerade Reply
Denial of service None of these
is the protection of transmitted data from passive attacks
Authentication Access control
Data integrity Data confidentially
is the scrambled message produced as output.
Secret key Cipher text
Plaint text Cryptanalysis
A process the input elements continuously, producing output
one element at a time, as it goes along.
Stream cipher Block cipher
Chain cipher None of these
A attacks attempts to learn or make use of information from the
system but does not affect system resources.
Active Negative
Passive None of these
Page 1 of 2
A is a piece of software that can "infect" other programs by
modifying them.
Malicious software Virus
Worm None of these
10) virus lodges in main memory as part of a resident system
program.
Parasitic Memory-resident
Boot sector Stealth
State true or false 04
Intrusion detection system have been developed to provide early warning
of an intrusion so that defensive action can be taken to prevent or
minimize damage
The denial of service do not prevents or inhibits the normal use or
management of communications facilities.
The encryption algorithm performs various substitution and
transformation on the plaintext.
SSL provides security services between TCP and applications that use
TCP.
Q.2 Write a short notes on the following
Internet standards
Hardware firewall
08
Answer the following 06
What is non-repudiation? Explain in short
What is data integrity?
Q.3 Attempt the following questions 14
How DES algorithm works? Explain the procedure of DES with example.
What is Attack? Explain types of Active Attacks.
Q.4 Attempt the following questions 14
Define Access Matrix? Explain capabilities of ACL.
What is Cryptanalysis? Explain strategy used by cryptanalyst to discover
plaintext or key.
Q.5 Attempt the following questions 14
Explain IP Encapsulating Security Protocol.
What is Biometric? Explain behavioral characteristics of individuals in
biometric
Q.6 Attempt the following questions 14
What is Firewall? Explain types of Firewalls.
How E-mail security can be achieved? Explain in detail.
Q.7 Attempt the following questions 14
What are the business requirements of Secure Electronic Transaction
Explain the features of Kerberos and requirements associated with it
Examination: Oct Nov 2016 Semester V (New CGPA)
SLR No. Day
Date Time Subject Name Paper
No. Seat No.
SLR U
38
Monday
21/11/2016
10.30 AM
to
01.00 PM
Network Security
C
Instructions: Question no. 1 2 are compulsory
Attempt any three questions from Q. No. 3 to Q. No. 7
Figures to the right indicate full marks.
Total Marks: 70
Q.1 Choose the correct alternatives 10
Pretty good privacy is used in
Browser security Email security
FTP security None of these
This consist of encrypted content of any type and encrypted content
encryption keys for one or more recipients
Enveloped data Signed data
Clear-singed data None of these
responsible for technical management of IEFT activities and
the Internet standard process.
IAB IETF
IESG None of these
A prevents or inhibits the normal use or management of
communications facilities.
Masquerade Reply
Denial of service None of these
is the protection of transmitted data from passive attacks
Authentication Access control
Data integrity Data confidentially
is the scrambled message produced as output.
Secret key Cipher text
Plaint text Cryptanalysis
A process the input elements continuously, producing output
one element at a time, as it goes along.
Stream cipher Block cipher
Chain cipher None of these
A attacks attempts to learn or make use of information from the
system but does not affect system resources.
Active Negative
Passive None of these
Page 1 of 2
A is a piece of software that can "infect" other programs by
modifying them.
Malicious software Virus
Worm None of these
10) virus lodges in main memory as part of a resident system
program.
Parasitic Memory-resident
Boot sector Stealth
State true or false 04
Intrusion detection system have been developed to provide early warning
of an intrusion so that defensive action can be taken to prevent or
minimize damage
The denial of service do not prevents or inhibits the normal use or
management of communications facilities.
The encryption algorithm performs various substitution and
transformation on the plaintext.
SSL provides security services between TCP and applications that use
TCP.
Q.2 Write a short notes on the following
Internet standards
Hardware firewall
08
Answer the following 06
What is non-repudiation? Explain in short
What is data integrity?
Q.3 Attempt the following questions 14
How DES algorithm works? Explain the procedure of DES with example.
What is Attack? Explain types of Active Attacks.
Q.4 Attempt the following questions 14
Define Access Matrix? Explain capabilities of ACL.
What is Cryptanalysis? Explain strategy used by cryptanalyst to discover
plaintext or key.
Q.5 Attempt the following questions 14
Explain IP Encapsulating Security Protocol.
What is Biometric? Explain behavioral characteristics of individuals in
biometric
Q.6 Attempt the following questions 14
What is Firewall? Explain types of Firewalls.
How E-mail security can be achieved? Explain in detail.
Q.7 Attempt the following questions 14
What are the business requirements of Secure Electronic Transaction
Explain the features of Kerberos and requirements associated with it
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology