ISE Question Papers
ISE Question Papers
3) In PGP operation the session key is encrypted using ________ public key
algorithm.
Virus pseudocode
infect( );
if ________( )
then _______( );
1 TLS / SSL
2 APPLICATION
3 IP
4 TCP
Q1 (B) Attempt any FIVE questions out of the following (attempt any 5 out of 7) 10
Class: TY B. Tech
Branch: Comp. Engg. Semester : VI
Full name of the course: Cryptography and System Security Course Code: 2UCC602
Duration: 1hr.15 min (attempting questions) +15 min (uploading) Max. Marks: 30
Q. Questions Marks
No
Q1 1.1 A security ___________ makes use of one or more security
___________
a. Service, Mechanisms
b.Goal, mechanisms
c. Mechanism, services
d.Mechanism, goals
1.7 In DES algorithm the block size = ____ and key size = _____
1.8 In AES algorithm the block size = _____ and key size = ______
(all variants)
Q2 Discuss various methods of defense giving at least one example for 10 marks
each method.
OR
A) Discuss DES algorithm analysis with respect to its strengths and 5 marks
weaknesses.
B) You have video file with size 100 MB, Illustrate how will you send
it securely using DES algorithm. 5 marks
Question Max.
No. Marks
Q 1 (a) What are the key principles of security. Explain with example? 10
Discuss Honeypots
K. J. Somaiya College of Engineering, Mumbai-77
OR
(a)Explain with diagram the process of using message authentication
code.(03)
(b)Can attacker alter the MAC? Yes or No? Give justification.(01)
(c)Is Mac algorithm similar to encryption and decryption process?
Justify.(02)
(d)Is it possible to use MD5 and SHA1 algorithms for calculating a MAC?
Justify.(02)
(e) List two limitations of MAC. Also state solution to the limitation.(02)
OR
(a)Explain salami attack with example(05)
(b)Explain Incomplete mediation with example.(05)
24|95|2022(E) ,
(Autonomous College Affiliated to University of Mumbai)
|
. Marks
~ Question
No 7 tan eli ic tt ae
Q1(a) | Describe Threats, Vulnerabilities and Attack with examples. |
OR
Q2 (a) Explain Vulnerability Scanning and write steps for vulnerability scanning | 10
of an E-commerce website application assuming any scanning tool.
Q3(b) | Write how insecure session handling can lead to attack with an example. 10)
Write three different ways to manage insecure sessions?
OR
State any three weaknesses possible while implementing and handling
session token.
Q4 (a) Write the different types of XSS vulnerability in brief. Explain any one} 10
with an example.
Q4 (b) Describe any two ways to identify XSS exploitation and also write two 10
ways to mitigate them.
Pato
Q5 (a) What is SQL injection? Demonstrate with an example any one sql| 10
injection attack and its mitigating steps.
OR
Write down different ways in which network traffic/data can be analyzed
during penetration testing.
Question Max.
No. Marks,
Qi What are different types of threats to security? Map each threat to a goal
of security. Justify the mapping with the help of an example.
Q2(a) | Explain the applications of public key cryptography and problems 10
associated.
Q2(b) | What is primitive root or generator. Consider a=10, b=12 as two secrets, 10
a prime p=17 in Diffie- Hellman key exchange protocol, find smallest
generator g of the given prime p and shared symmetric key.
Q2(c) | Explain DES in detail. State and justify the reason behind failure of DES. 10
OR
What is a stream cipher? Explain any hardware based stream cipher.
Q3 (a) | Explain Needham schroder protocol in detail. 10
OR
Explain the significance of the following terms in network security with
the help of an example.
i) CAPTCHA
ii) Covert Channel
Q3(b) | What is Access Control Matrix (ACM). Discuss problems and solutions 10
to ACM.
Q4(b) | Explain software flaws with the help of a suitable example of each. 10
OR
What is the difference between malicious and non-malicious code.
Explain any two malicious code examples.
Q5 (a) | Explain Reconnaissance of network and web server vulnerabilities. 10
OR
IPSec provides security at network layer then what is the need of SSL.
Explain how client and server establish SSL connection.
Q5(b) | Explain DHCP and ARP attacks. 10
17-05 201HE
K. J. Somaiya College of Engineering, Mumbai-77
(Autonomous College Affiliated to University of Mumbai)
Question Max.
No. Marks
SECTION B
Q4 Attempt any four. 20
a. Explain packet sniffing with example.
b. Write down the steps of Needham schrodhar authentication protocol.
c What is linearization attack?Explain with example.
d. Explain any five web server vulnerabilities.
e. Explain the attacks on physical and data link layer of TCP/IP.
f. What is access control? What is the significance of ACL?
Q5 Attempt any four. 20
a. Explain password authentication.
b. Explain five malware in software security.
c. What is multilateral security?
d. Write a note on firewall.
e. Write a note on authentication method: single sign on .
f. What is the significance of honeypots.
(2) A Web site that allows users to enter text, such as a comment or a name,
and then stores it and later display it to other users, is potentially vulnerable to
a kind of attack called a attack.
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
My
a) Worm
b) Bomb
c) Trojan Horse
d) Virus
Vas
2.) +2018 CE)
K. J. Somaiya College of Engineering, Mumbai-77
(Autonomous College Affiliated to University of Mumbai)
Question Marks
No.
Ql) What do you understand by vulnerability, threat and control? 10
Explain in detail the goals of security.
Q3 (a) Explain what is Access Control Matrix. Explain ACL (Access Control 10
List) in detail.
Q3 (b) Differentiate between authentication and authorization. Explain password 10-
authentication.
OR
Q3 (b) Explain Biometric authentication in detail. 10
Q4 (a) 10
Q5 (b} What are the protocols used for Email security. Give an explanation of
any one.
OR 10
Q5 (b) What are Firewalls? Explain different types of Firewalls.
Pg j oF|
K. J. Somaiya College of Engineering, Mumbai-77
_iutopomous College Affiliated to University of eae) a
“Semester: January—May 2022~
In-Semester Examination
Class: TY B. Tech
Branch: COMP Semester : VI
Full name of the course: Cryptography and.System Security... ....Course Code: 2UCC602
Duration: lhr.15 min Max. Marks: 30
OR
Discuss and Justify how confusion and diffusion is introduced and 10 marks
increased in DES algorithm.
Q3 Discuss with neat diagram how asymmetric key cryptography can be 10 marks
used for confidentiality and authentication security services.
K. J. Somaiya College of Engineering, Mumbai-77
wo)
ae College Affiliated to University of ie ab ae
“Semester: January-May 2022
In-Semester Examination
Class: TY B. Tech
Branch: COMP
Full name of the course: Cryptography and System Security... Course Code: 2UCC602
Duration: lhr.15 min Max. Marks: 30
(Pw 7) pee
Q. No Questions Marks
QI List six methods of defense used for system security. § +S marks
Give at least one example of each method of défense.
OR
Que. Question
No.
Q2 A | Solve the following
i) | What are initialization vectors? Comment onhow ipsdiagion and exclusion of
| initialization vectors affect security goals:-Give-asuitable example to support
your claims.
ii) | Design the following, assume suitable data. 14242
a. A P-Box with 8 inputs - 8 outputs
b. A P-Box with 8 inputs — 12 outputs
c. AS-Box with 8 inputs — 4 outputs (8 inputs can be represented
using binary code 000-111)
OR
Q2 A | Compare and contrast between stream ciphers and block ciphers on the basis of: 10
a. Security : consider cryptography and cryptanalysis, both
b. Speed and efficiency
c. Ease of implementation in hardware and software
d. Examples algorithms from both categories
e. At least two application scenarios
Page 1 of 2
es
Que. aT corner
|_No.
Q5_| (Write notes / Short question type) on any four
i) What are Discrete logarithms? Explain their significance in applied
cryptography.
ii) | Discuss Secure Multiparty Computation with strengths, weaknesses and 5
applications
iii) _| Cryptographic Hash function requirements 5
iv) | Discuss Asymmetric.encryption for Authentication 5
v)__| Weakness(s) of RSA; State solutions over the same. 5
vi) _| MDS: Strengths, weaknesses, applications 5
Page 2 of 2
@
f: oe ae
“9S SOMATYA
a4
Suche?
ae vw YAVIAR UNIVERSITY
24-01" 2023(E)™”
Semester: January 2023 —May 2023
Maximum Marks: 100 Examination: ESE Examination Duration:3 Hrs.
Bieerscame enact]
Programme: B Tech Computer Engineering -
_ _. | Class: TY Semester: VI (SVU 2020)
Name of the Constituent College:
Name of the department: Computer
K. J. Somaiya College of Engineering
Course Code: 116U0iC602 | Name of the Course: Information Security
Instructions: 1)Draw neat diagrams 2) Ali questions are compulsory
3) Assume suitable data wherever necessary
Posey e_
(a Question Max. ,
. : Marks
Q4_ | Solve any Two 20
i) What is a firewall? List the type of firewalls categorized by processing mode. 10
Draw a schematic diagram of a packet filtering router used as a firewall and
explain its function using a sample firewall rule.
ii) How does PGP provide authentication arid confidentiality for email services 10
: and for file transfer applications? Draw the block diagram and explain the
components.
iii) What are the important ethical issues in cybersecurity? Explain in detail. 410
Question Marks
No.
Qi Explain Vulnerability, threats and attacks with respect to Software| 10
Application.
OR
What are the three basic Cyrptography techniques.
Q2(a) | Write difference between the following 10
1) AES and DES
2) Symmetric and Asymmetric Cryptography
Q2(b) | Explain how Crptography and Digital signature can help in maintaining | 10
Confidentiality and Non Repudiation.
OR
Explain Knapsack Cryptosystem with the help of an example
Q3 (a) | Explain how Covert Channel is different from Trojan Horse with| 10
example.
Q4(a) | Describe Incomplete mediation and Race condition with respect to web| 10
security.