NIS
NIS
22232
3 Hours I 70 Marks Scat No .
Il
Jnstructio11s : ( 1) All Questions are compulsory.
(2) Jllustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.
Marks
(i) Cryptography
(ii) Cryptology
fi§ [1 of 4) P.T.O.
21610 [2 of 4)
(b) Ddin e following with suitable example :
(i) DAC
(ii) MAC
(b) Convert plain text into cipher text by using Simple column er
technique of the
following sentence :
(c) State any four difference between Firewall and Intrusion Detec
tion System .
(d) Describe any four password selection criteria.
(e) Find the output of the initial pennutation box when the
input is given in
hexadecimal as
(i) Assels
(ii) Vulnerability
(iii) Risks
Marks
(i) Confidentiality
(ii) Accountability
(ii) Piggybacking
11 of 4) P.T.O.
12 of 4J
22620
y two).
(e) Differentiate between viruses & wonns (An
(iii) Patch
: 12
3. Attempt any THREE of the foJJowing
trol policy.
(a) Describe the features of DAC access con