0% found this document useful (0 votes)
77 views2 pages

Cns QP

This document is an exam for a B.Tech degree in Electronics and Communication Engineering. It contains 20 multiple choice questions worth 2 marks each (Part A) and 4 longer answer questions worth 13 marks each, with students to choose one question from each of the 5 units (Part B). The exam tests students' knowledge of cryptography, network security, encryption algorithms like AES and RSA, authentication protocols like Kerberos, firewalls, and intrusion techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views2 pages

Cns QP

This document is an exam for a B.Tech degree in Electronics and Communication Engineering. It contains 20 multiple choice questions worth 2 marks each (Part A) and 4 longer answer questions worth 13 marks each, with students to choose one question from each of the 5 units (Part B). The exam tests students' knowledge of cryptography, network security, encryption algorithms like AES and RSA, authentication protocols like Kerberos, firewalls, and intrusion techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

B.

Tech DEGREE EXAMINATION , DECEMBER-2020 SET-


Fifth/ Seventh Semester
Electronics and Communication Engineering
EC E14-CRYPTOGRAPHY AND NETWORK SECURITY
(2013-14 ONWARDS)

Time: 3 hours Maximum: 75 marks

Instructions:
IMP: Verify that you have received question paper with correct course, code, branch etc.
i) All questions are compulsory.
ii) Figure to the right indicate full marks.
iii) Assume suitable data wherever necessary.
Marks B.L CO’s
PART A (20 Marks)
Answer all the Questions
Q.1 Specify the components of encryption algorithm 2 1 CO1
Q.2 Distinguish between threat and attack? 2 1 CO1
Q.3 Compare Substitution and Transposition techniques 2 2 CO2
Q.4 What are the different modes of operation in DES? 2 2 CO2
Q.5 Give the applications of public key cryptosystem. 2 2 CO3
Q.6 Define confidentiality and authentication 2 1 CO3
Q.7 List out the requirements of Kerberos. 2 2 CO4
Q.8 List out various types of firewall 2 2 CO4
Q.9 What do you mean by Trojan horses? 2 2 CO5
Q.10 List the three classes of intruders. 2 2 CO5
PART B (55 Marks)
Answer all the Questions Choosing one question from each unit
Q.11 Explain in detail about spread spectrum technologies in 13 2 CO1
detail.
(OR)
Q.12 Describe briefly about OSI layer security architecture and 13 2 CO1
security services.
Q.13 Describe in detail about the key generation in AES algorithm 13 3 CO2
and its expansion format.
(OR)
Q.14 Perform Encryption and decryption using HILL cipher for 13 4 CO2
the following.
Message:PEN and Key:ACTIVATED
Q.15 Explain about MD5 algorithm in detail. 13 3 CO3
(OR)
Q.16 Perform Encryption and decryption using RSA algorithm 13 4 CO3
for p=17,q=11,e=7 and M=88.
Q.17 Evaluate the performance of PGP. Compare it with 13 3 CO4
S/MIME.
(OR)
Q.18 Describe in detail about SSL/TSL. 13 2 CO4
Q.19 Explain the various types of firewalls with neat diagram. 13 2 CO5
(OR)
Page 1 of 2
Q.20 Explain in detail about the concept of Password technique 13 2 CO5
and malicious software.

Page 2 of 2

You might also like