INFORMATION AND NETWORK SECURITY INS June 2010 Semester 6 BE IT
Con. 3495-10. (REVISED COURSE) AN-4588
(3 Hours) [Total Marks:100]
N.B.: (1) Question No. 1 is compulsory.
(2) Attempt any four questions out of remaining six questions
Con. 3495-10. (REVISED COURSE) AN-4588
(3 Hours) [Total Marks:100]
N.B.: (1) Question No. 1 is compulsory.
(2) Attempt any four questions out of remaining six questions
1. (a) | What are the key principles of security ? Explain with example ? | 5 |
| (b) | Compare secret key and public key encryption ? | 5 |
| (c) | Distinguish among Vulnerability,threat and control. | 5 |
| (d) | List three controls that could be applied to detect or prevent salami attacks ? | 5 |
2. (a) | Compare AES and DES. Comment on Double and Triple DES ? | 10 |
| (b) | What is digital signature ? Explain in brief ? | 10 |
3. (a) | Explain Denial of Service attack in networks. | 10 |
| (b) | List and explain various malicious and non-malicious codes with examples. | 10 |
4. (a) | What is firewall ? Describe the types of firewalls with their limitations ? | 10 |
| (b) | Describe the types of IDSs and their limitations ? Why we need hybird IDSs ? | 10 |
5. (a) | Explain the use of temporal, physical and logical separation for security in | 10 |
| Computing environment ? | ||
| (b) | What are the various forms of prtection that operating system applies at the file | 10 |
| level | ||
6. (a) | What is the term Risk Analysis ? Explain in detail the steps in Risk analysis ? | 10 |
| (b) | Explain Secure-Email system with example. | 10 |
7. | Write short notes on any three of the following :- | 20 |
| (a) Kerberos System | ||
| (b) RSA algorithm | ||
| (c) Hash functions | ||
| (d) ARP Spooting. |
No comments:
Post a Comment