Thursday, April 17, 2014

INFORMATION AND NETWORK SECURITY INS December 2012 Semester 6 BE IT

INFORMATION AND NETWORK SECURITY INS December 2012 Semester 6 BE IT

Con.8260-12.                                                                                                      KR-8738
                                                          (3 Hours)                                         [Total Marks : 100]
 

N.B : (1) Question No. 1 is compulsory.
         (2) Attempt any four questions from remaining six questions.

1.

Attempt any four :-

20
(a) What is primary advantages of SSL over IP Sec ? What is primary advantages
     of IP Sec. over SSL ?
(b) What is the distinction between a polymoriphic and a metamorphic worm ?
     How might metamorphic software be used for good instead of evil ?
(c) What is validation error and how can such an error lead to a security flow ?
(d) What is a race condition ? Discuss an example of race condition ?
(e) 'Strength and DES depends on the S-boxes in DES'. Comment on the statement.

2.

Explain technique (or fundamental concepts behind) following attacks ?

20
(Attempt any five) :-
      (a) Cross site scripting
      (b) ARP poisioning
      (c) Packet sniffing
      (d) Spoofing
      (e) Session hijacking
      (f) Piny to Death
      (g) Root Traverse attack on web server.

3. (a)

Why is it a good idea to hash passwords that are stored in a file ? What is a "Salt"

5
and why should a salt be used whenever passwords are hashed ?
    (b)Explain Visual CAPTCHA.5
    (c)How are polyalphabetic ciphers implemented and how are they superior to10
monoalphabetic ciphers ?

4. (a)

Explain DMZ in enterprise wide Networks. Explain various attacks possible

10
on DMZ and its counter measure.
    (b)Explain key generation, encryption and decryption in the RSA algorithm.10

5. (a)

Identify security issue due to protocol. Weakness in following protocols.

10
    (i) CSMALCD      (ii) Ethernet with MTU 1500.
    (b)What isdiffernces between Digital signature and Digital certificate.5
    (c)Explain Diffie-Itellmon key exchange algorithm.5

6. (a)

How is Authentication acieved in Pretty Good Privacy ?

5
    (b)What are the possible attacks on the password. Explain each in detail ?5
    (c)What is Acess Control ? How it is different from availability ?5
    (d)Explain relationship betwwen confidentiality, integrity and availability.5

7.

Write short notes :-

20
     (a) PKI
     (b) IDS/IPS
     (c) Firewall
     (d) KERBE-ROS

Also see Information and network security question papers for May 2013

No comments:

Post a Comment