0% found this document useful (0 votes)
15 views

Network and Information Security

This document contains exam questions for a Network and Information Security course. It is divided into two parts: Part A contains 10 multiple choice questions covering topics like the OSI security architecture, cryptography, access control lists, and security threats. Part B contains 5 longer answer questions, asking students to explain security services, encryption standards like AES and RSA, digital signatures, OWASP vulnerabilities, Kerberos, and computer viruses.

Uploaded by

Suveetha Suvi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Network and Information Security

This document contains exam questions for a Network and Information Security course. It is divided into two parts: Part A contains 10 multiple choice questions covering topics like the OSI security architecture, cryptography, access control lists, and security threats. Part B contains 5 longer answer questions, asking students to explain security services, encryption standards like AES and RSA, digital signatures, OWASP vulnerabilities, Kerberos, and computer viruses.

Uploaded by

Suveetha Suvi
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

R2015

MAHENDRA ENGINEERING COLLEGE


(AUTONOMOUS)
M.E DEGREE EXAMINATIONS APRIL 2016
SECOND SEMESTER
Computer Science and Engineering
15CSE13202 Network and Information Security
Time: 3 Hrs

Maximum : 100 Marks

PART A

(10 * 2 = 20 Marks)

1. What is OSI Security Architecture?


2. What is the difference between Active and Passive Security Threads?
3. What is Cryptography?
4. What is the difference between Differential & Linear Cryptanalysis?
5. What are the roles of the Public and Private Keys?
6. Define Elliptic Curve Cryptogrphy.
7. What is Access Control List?
8. List the top of OWASP vulnerabilities
9. Define Kerberos
10. List the three classes of Intenders

PART B

(5 * 16 = 80 Marks)

11. (a) Explain in detail about Security Services


( or )
(b) Describe in detail about Confidentiality Policies.
12.(a) Write short notes on HMAC , SHA 512
( or )
(b) Explain in detail about Advanced Encryption Standard
13.(a) Explain in detail bout Digital Signature with diagram
( or )
(b)( i ) Explain RSA Cryptosystem in detail.
( ii ) Write short notes on RSA attacks.

14 (a) Describe the OWASP Vulnerabilities


(i)
(ii)
(iii)

Buffer Overflow
Command Injection
Canonical Data Format.
( or )

(b) Describe in detail about Confinement Problem with diagram


15 (a) Explain the Version4 of Kerberos with neat diagram
( or )
(b) Explain in detail about Viruses and Related Threats.

You might also like