Information and Cyber Security
Information and Cyber Security
:
P613
tic
[Total No. of Pages : 2
sta
BE/Insem/APR - 246
:05
B.E. (Computer Engineering)
:39
01
INFORMATION AND CYBER SECURITY
13
85
(2015 Pattern) (Semester - II)
19
01
Time : 1 Hour] /20 [Max. Marks : 30
/03
N
12
tic
3) Figures to the right indicate full marks.
sta
4) Assume suitable data, if necessary.
7.2
:05
11
:39
01
Q1) a) Explain Operational Security Model for Network Security.
13 [5]
85
b) How Information Security attacks are classified? Give example for each.
19
[5]
01
/20
/03
GN
OR
12
tic
sta
39
7.2
:05
:39
3/2 50
1
13
i) ECB
01
01
ii) OFB
GN
OR
1 2/0
examples. [5]
39
7.2
11
P.T.O.
Q5) a) Find the key exchanged between Alok and Bobby considering following
data.
tic
i) n = 11
sta
ii) g=5
:05
iii) X = 2, Y = 3
:39
01
Find value of A, B and secret key K. [5]
13
85
19
b) What is Kerberos? Explain operation in detail. [5]
01
/20 OR
/03
N
39 EG
12
tic
b) Explain in details the need & implementation of one way hash function
sta
(MD5). [5]
7.2
:05
11
:39
01
ïïï
13
85
19
01
/20
/03
GN
12
CE
.98
.47
tic
sta
39
7.2
:05
11
:39
3/2 50
1
9 13
8
01
01
GN
1 2/0
CE
.98
.47
39
7.2
11
BE/Insem/APR - 246 2