0% found this document useful (1 vote)
1K views

Network Security Model Question Paper

This document contains 8 questions about network security for an exam. The questions cover topics such as defining security and computer criminals, transposition ciphers and cryptanalysis, program security flaws, RSA and Diffie-Hellman key exchange algorithms, message digests and hash functions, digital signatures, Kerberos, PGP, IP security architecture, ESP modes, SSL protocols, password management, and types of firewalls. The questions range from 4 to 8 marks each.

Uploaded by

SaiTeja
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views

Network Security Model Question Paper

This document contains 8 questions about network security for an exam. The questions cover topics such as defining security and computer criminals, transposition ciphers and cryptanalysis, program security flaws, RSA and Diffie-Hellman key exchange algorithms, message digests and hash functions, digital signatures, Kerberos, PGP, IP security architecture, ESP modes, SSL protocols, password management, and types of firewalls. The questions range from 4 to 8 marks each.

Uploaded by

SaiTeja
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

IV I B.

Tech CSE
Network Security Model Question Paper
1. A) Define Security? Write about the Computer Criminals?
B) Explain Transpositions? Define cryptanalysis and how we will do cryptanalysis on
Transpositions?

6M

2. A) Explain Program Security Flaws and its types?


B) Explain the following
i) Brain virus
ii) Web bugs

6M

8M

(4+4)M

3. A) Explain briefly about RSA Algorithm?


B) Write about Diffie-Hellman key exchange technique?

7M
7M

4. A) Explain about Message Digest?


B) Write about Whirlpool Hash Structure?

7M
7M

5. A) Explain the usage of Digital Signatures?


B) What is Kerberos? What is the motivation for Kerberos approach?

8M
6M

6. A) Write about Operational Description of PGP?


B) Describe IP Security Architecture?

8M
6M

7. A) Explain the following :


i) Transport Mode ESP
ii) Tunnel Mode ESP
B) Explain briefly about Security Socket Layer Protocols?
8. A) Write about Password Management?
B) Explain types of Firewalls?

(3+3)M
8M
7M
7M

You might also like