This document contains exam questions for a Network and Information Security course. It is divided into two parts: Part A contains 10 multiple choice questions covering topics like the OSI security architecture, cryptography, access control lists, and security threats. Part B contains 5 longer answer questions, asking students to explain security services, encryption standards like AES and RSA, digital signatures, OWASP vulnerabilities, Kerberos, and computer viruses.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
15 views
Network and Information Security
This document contains exam questions for a Network and Information Security course. It is divided into two parts: Part A contains 10 multiple choice questions covering topics like the OSI security architecture, cryptography, access control lists, and security threats. Part B contains 5 longer answer questions, asking students to explain security services, encryption standards like AES and RSA, digital signatures, OWASP vulnerabilities, Kerberos, and computer viruses.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
R2015
MAHENDRA ENGINEERING COLLEGE
(AUTONOMOUS) M.E DEGREE EXAMINATIONS APRIL 2016 SECOND SEMESTER Computer Science and Engineering 15CSE13202 Network and Information Security Time: 3 Hrs
Maximum : 100 Marks
PART A
(10 * 2 = 20 Marks)
1. What is OSI Security Architecture?
2. What is the difference between Active and Passive Security Threads? 3. What is Cryptography? 4. What is the difference between Differential & Linear Cryptanalysis? 5. What are the roles of the Public and Private Keys? 6. Define Elliptic Curve Cryptogrphy. 7. What is Access Control List? 8. List the top of OWASP vulnerabilities 9. Define Kerberos 10. List the three classes of Intenders
PART B
(5 * 16 = 80 Marks)
11. (a) Explain in detail about Security Services
( or ) (b) Describe in detail about Confidentiality Policies. 12.(a) Write short notes on HMAC , SHA 512 ( or ) (b) Explain in detail about Advanced Encryption Standard 13.(a) Explain in detail bout Digital Signature with diagram ( or ) (b)( i ) Explain RSA Cryptosystem in detail. ( ii ) Write short notes on RSA attacks.
14 (a) Describe the OWASP Vulnerabilities
(i) (ii) (iii)
Buffer Overflow Command Injection Canonical Data Format. ( or )
(b) Describe in detail about Confinement Problem with diagram
15 (a) Explain the Version4 of Kerberos with neat diagram ( or ) (b) Explain in detail about Viruses and Related Threats.
Anna Univ May - June Model Questions High Performance Computer Networks Question Paper June 2011-2013 - Anna University Results 2013 - Anna Univ Updates PDF