0% found this document useful (0 votes)
45 views

Information Sec

This document outlines the questions for the III B.Tech II Semester Regular/Supplementary Examinations in Information Security for the Computer Science and Engineering department in May 2010. It includes 8 questions related to topics in information security, with each question worth 16 marks. Students are instructed to answer any 5 questions. The questions cover topics such as IPSec, public key cryptography, Kerberos, TCP/UDP hijacking, web security threats, PGP, firewall configurations, encryption in viruses, SNMPv3, block/stream ciphers, product ciphers, and Fiestel cipher structures.

Uploaded by

balu56kv
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Information Sec

This document outlines the questions for the III B.Tech II Semester Regular/Supplementary Examinations in Information Security for the Computer Science and Engineering department in May 2010. It includes 8 questions related to topics in information security, with each question worth 16 marks. Students are instructed to answer any 5 questions. The questions cover topics such as IPSec, public key cryptography, Kerberos, TCP/UDP hijacking, web security threats, PGP, firewall configurations, encryption in viruses, SNMPv3, block/stream ciphers, product ciphers, and Fiestel cipher structures.

Uploaded by

balu56kv
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Code No: 07A60503

R07

Set No. 1

III B.Tech II Semester Regular/Supplementary Examinations,May 2010 Information Security Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks

1. (a) Explain the benets of IPSec? (b) Give an overview of IPSec document? [8+8]

2. (a) Explain how condentiality service is achieved in public key cryptography? (b) Explain the operation of Kerberos? 3. (a) What is TCP session hijacking? (b) Explain UDP hijacking? 4. (a) Explain the various web security threats? (b) Explain the signicance of dual signature in SET? 5. (a) Explain the general structure of private and public key rings? (b) Explain the PGP trust model? (c) Explain MIME encoding techniques? 6. Explain the dierent types of rewall congurations? [4+4+8] [16] [8+8] [8+8] [8+8]

7. (a) What is the role of compression and encryption in the operation of a virus? (b) Explain the SNMPv3? 8. (a) What is the dierence between a block cipher and a stream cipher? (b) What is a product cipher? (c) Explain the estel cipher structure? [16] [8+8]

You might also like