Exam Details
Subject | network security | |
Paper | ||
Exam / Course | m.c.a.science | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | November, 2016 | |
City, State | maharashtra, solapur |
Question Paper
Master of Computer Application III (Science)
Examination: Oct Nov 2016 Semester V (Old CGPA)
SLR No. Day
Date Time Subject Name Paper
No. Seat No.
SLR U
43
Monday
21/11/2016
10.30 AM
to
01.00 PM
Network Security
C
Instructions: Question no. 1 2 are compulsory
Attempt any three questions from Q. No. 3 to Q. No. 7
Figures to the right indicate full marks.
Total Marks: 70
Q.1 Choose the correct alternatives 10
are very crucial for success of RSA algorithm.
Integers Prime numbers
Negative numbers Fraction
is the ability to limit and control the access to host systems and
applications via communications links
Message authentication Access control
Confidentiality Integrity
SSL provides
Message integrity Confidentiality
Compression All of the mentioned
is the most common authentication mechanism
Smart card PIN
Biometrics Password
Application gateways are than packet filters
Less secure More secure
Equally secure Slower
A combination of an encryption algorithm and a decryption algorithm is
called a
Cipher Secret
Key None of the above
is the message digest algorithm
DES IDEA
MD5 RSA
operates in the transport mode or the tunnel mode.
IPSec SSL
PGP None of the above
function creates a message digest out of a message.
Encryption Decryption
Hash None of the above
Page 1 of 2
10) SET uses the concept of
Double signature Dual signature
Multiple signature Single signature
State whether true or false 04
In transposition cipher letters of plaintext are replaced by other letters or by
numbers or symbols.
PGP is popular email security protocol.
RSA is a symmetric key cryptographic algorithm.
DES encrypts blocks of 64 bits
Q.2 Write short note on 08
Application category
Types of Attacks
Answer the following 06
Explain smart card in short
What is cryptanalysis?
Q.3 Explain various security services.
Define the term cipher. Explain Caesar cipher with example.
08
06
Q.4 What is Kerberos? Explain how it provides authenticated service.
Explain secure socket layer in detail.
08
06
Q.5 Explain Secure Electronic transaction with neat diagram.
Explain block ciphers and stream ciphers in detail.
08
06
Q.6 Explain IPsec in detail.
Explain digital signature in detail.
08
06
Q.7 What is intruder? Explain different types of intruders.
Define Access Matrix. Explain Access Control Model.
08
06
Examination: Oct Nov 2016 Semester V (Old CGPA)
SLR No. Day
Date Time Subject Name Paper
No. Seat No.
SLR U
43
Monday
21/11/2016
10.30 AM
to
01.00 PM
Network Security
C
Instructions: Question no. 1 2 are compulsory
Attempt any three questions from Q. No. 3 to Q. No. 7
Figures to the right indicate full marks.
Total Marks: 70
Q.1 Choose the correct alternatives 10
are very crucial for success of RSA algorithm.
Integers Prime numbers
Negative numbers Fraction
is the ability to limit and control the access to host systems and
applications via communications links
Message authentication Access control
Confidentiality Integrity
SSL provides
Message integrity Confidentiality
Compression All of the mentioned
is the most common authentication mechanism
Smart card PIN
Biometrics Password
Application gateways are than packet filters
Less secure More secure
Equally secure Slower
A combination of an encryption algorithm and a decryption algorithm is
called a
Cipher Secret
Key None of the above
is the message digest algorithm
DES IDEA
MD5 RSA
operates in the transport mode or the tunnel mode.
IPSec SSL
PGP None of the above
function creates a message digest out of a message.
Encryption Decryption
Hash None of the above
Page 1 of 2
10) SET uses the concept of
Double signature Dual signature
Multiple signature Single signature
State whether true or false 04
In transposition cipher letters of plaintext are replaced by other letters or by
numbers or symbols.
PGP is popular email security protocol.
RSA is a symmetric key cryptographic algorithm.
DES encrypts blocks of 64 bits
Q.2 Write short note on 08
Application category
Types of Attacks
Answer the following 06
Explain smart card in short
What is cryptanalysis?
Q.3 Explain various security services.
Define the term cipher. Explain Caesar cipher with example.
08
06
Q.4 What is Kerberos? Explain how it provides authenticated service.
Explain secure socket layer in detail.
08
06
Q.5 Explain Secure Electronic transaction with neat diagram.
Explain block ciphers and stream ciphers in detail.
08
06
Q.6 Explain IPsec in detail.
Explain digital signature in detail.
08
06
Q.7 What is intruder? Explain different types of intruders.
Define Access Matrix. Explain Access Control Model.
08
06
Other Question Papers
Subjects
- .net
- artificial intelligence
- computer communication network
- computer graphics
- computer oriented statistics
- data mining and warehouse
- data structures
- database management system
- digital circuits and microprocessors
- digital image processing
- discrete mathematical structures
- distributed operating system
- finite automata
- introduction to computers
- java programming
- management
- mobile computing
- network security
- numerical analysis
- object oriented programming using c++
- opeartions research
- operating system
- pattern recognition mobile computing
- programming using - c
- programming with php
- software engineering
- system software
- uml
- web design techniques
- web technology