Cns QP
Cns QP
Instructions:
IMP: Verify that you have received question paper with correct course, code, branch etc.
i) All questions are compulsory.
ii) Figure to the right indicate full marks.
iii) Assume suitable data wherever necessary.
Marks B.L CO’s
PART A (20 Marks)
Answer all the Questions
Q.1 Specify the components of encryption algorithm 2 1 CO1
Q.2 Distinguish between threat and attack? 2 1 CO1
Q.3 Compare Substitution and Transposition techniques 2 2 CO2
Q.4 What are the different modes of operation in DES? 2 2 CO2
Q.5 Give the applications of public key cryptosystem. 2 2 CO3
Q.6 Define confidentiality and authentication 2 1 CO3
Q.7 List out the requirements of Kerberos. 2 2 CO4
Q.8 List out various types of firewall 2 2 CO4
Q.9 What do you mean by Trojan horses? 2 2 CO5
Q.10 List the three classes of intruders. 2 2 CO5
PART B (55 Marks)
Answer all the Questions Choosing one question from each unit
Q.11 Explain in detail about spread spectrum technologies in 13 2 CO1
detail.
(OR)
Q.12 Describe briefly about OSI layer security architecture and 13 2 CO1
security services.
Q.13 Describe in detail about the key generation in AES algorithm 13 3 CO2
and its expansion format.
(OR)
Q.14 Perform Encryption and decryption using HILL cipher for 13 4 CO2
the following.
Message:PEN and Key:ACTIVATED
Q.15 Explain about MD5 algorithm in detail. 13 3 CO3
(OR)
Q.16 Perform Encryption and decryption using RSA algorithm 13 4 CO3
for p=17,q=11,e=7 and M=88.
Q.17 Evaluate the performance of PGP. Compare it with 13 3 CO4
S/MIME.
(OR)
Q.18 Describe in detail about SSL/TSL. 13 2 CO4
Q.19 Explain the various types of firewalls with neat diagram. 13 2 CO5
(OR)
Page 1 of 2
Q.20 Explain in detail about the concept of Password technique 13 2 CO5
and malicious software.
Page 2 of 2