0% found this document useful (0 votes)
87 views

Information Assurance & Network Security

This document is an exam for a computer engineering course on information assurance and network security. It contains 12 questions ranging from 3-8 marks each on topics like security goals, symmetric and asymmetric encryption, hashing, digital signatures, key management, intrusion detection, firewalls, password management, mobile security, computer forensics, cybercrime, and online investigation tools. Students must answer 6 out of the 12 questions.

Uploaded by

Payal Aacharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

Information Assurance & Network Security

This document is an exam for a computer engineering course on information assurance and network security. It contains 12 questions ranging from 3-8 marks each on topics like security goals, symmetric and asymmetric encryption, hashing, digital signatures, key management, intrusion detection, firewalls, password management, mobile security, computer forensics, cybercrime, and online investigation tools. Students must answer 6 out of the 12 questions.

Uploaded by

Payal Aacharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B.E. (Computer Engineering) Seventh Semester (C.B.S.

)
Information Assurance & Network Security

P. Pages : 2 TKN/KS/16/7597
Time : Three Hours *0960* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

.O
7. Solve Question 11 OR Questions No. 12.
8. Assume suitable data whenever necessary.
9. Illustrate your answers wherever necessary with the help of neat sketches.

ts
1. a) Explain the terminology security and attacks. Also discuss various security goals. 7

b) Discuss secret splitting and sharing. 6

n OR
de
2. a) Explain various modes of ciphers. 8

b) Write short notes on: 5


i) Discrete logarithm
tu

ii) Substitution and transposition

3. a) What is meant by symmetric key encryption ? "It provides least level of security and it 4
has no meaning in using" - Do you agree with the statement justify your answer.
S

b) Explain SHA-1 algorithm. 6


ur

c) Write short note on: 4


i) Linear cryptanalysis
ii) Differential cryptanalysis.
gp

OR

4. a) Discuss RSA algorithm. 4


Na

b) Explain MD 5 algorithm in detail. 7

c) Explain S-Boxes in DES. 3

5. a) Explain digital signature standard. 6

b) Write Diff-Hellman algorithm. 7

OR

TKN/KS/16/7597 1 P.T.O
6. a) Explain Kerberos 5.0 architecture. 7

b) Explain the importance of key generation distribution updation and digital certificate 6
relevant to the network security.

7. a) Explain tunnel mode and transport mode in brief. 6

b) Write short notes on : 8


Intrusion detection systems.

rg
i) Anomaly based ii) Signature based
iii) Host based iv) Network based systems

OR

.O
8. a) Discuss IP security architecture in detail. 8

b) Explain SSL handshake protocol. 6

ts
9. a) Explain various situations involved in password management. 6

b) Write notes on:


i) Mobile payments.
ii) Smart cards.
n 3
2
de
iii) Cheap card transactions. 2

OR

10. a) Differentiate between worms and viruses. Also explain lifecycle of worms. 6
tu

b) Explain various types of firewall designs (any two). 7

11. a) "Computer engineer must have knowledge about computer Forensics"- Comment on the 6
S

statement.
ur

b) Cyber terrorism is a serious issue now a days developed countries are facing. Do you think 7
that our country will also face the similar kind of problems in near future. Discuss the
scenario.
gp

OR

12. a) Discuss various online investigation tools. Also explain How they are useful in tracking 7
and recovering electronic evidences.
Na

b) Explain internet fraud and cyber stacking. 6

**********

TKN/KS/16/7597 2

You might also like