0% found this document useful (0 votes)
32 views

NIS

The document outlines an examination paper consisting of multiple questions related to computer security, cryptography, and cybercrime. It includes instructions for answering questions, such as the necessity of sketches and the assumption of suitable data. The paper is divided into sections with varying numbers of questions to be attempted, covering topics like digital signatures, firewalls, and access control mechanisms.

Uploaded by

Saloni Dhobale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

NIS

The document outlines an examination paper consisting of multiple questions related to computer security, cryptography, and cybercrime. It includes instructions for answering questions, such as the necessity of sketches and the assumption of suitable data. The paper is divided into sections with varying numbers of questions to be attempted, covering topics like digital signatures, firewalls, and access control mechanisms.

Uploaded by

Saloni Dhobale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

22620

22232
3 Hours I 70 Marks Scat No .
Il
Jnstructio11s : ( 1) All Questions are compulsory.
(2) Jllustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.

Marks

1. Attempt any FIVE of the following : 10

(a) Compare virus and logic bomb. (any two points).

(b) Identify any four individual user responsibilities in computer security.

(c) Define following terms :

(i) Cryptography

(ii) Cryptology

(d) Construct digital signature using cryptool.

(e) List any two types of active and passive attacks.

(t) State any two policies of the firewall.

(g) List any four types of cybercrimes.

2. Attempt any THREE of the following :


12
(a) Describe CIA model with suitable diagram.

fi§ [1 of 4) P.T.O.
21610 [2 of 4)
(b) Ddin e following with suitable example :

(i) DAC

(ii) MAC

(c) Differentiate between symmetric and asymmetric key cryptograph


y. (any four
points)

(d) Explain steganography technique with suitable example.

3. Attempt any THREE of the following :


12
(a) Describe piggy backing and shoulder surfing.

(b) Convert plain text into cipher text by using Simple column er
technique of the
following sentence :

"Maharastra State Board of Technical Education"

(c) State any four difference between Firewall and Intrusion Detec
tion System .
(d) Describe any four password selection criteria.

4. Attempt any THREE of the following :


12
(a) Convert the given plain text, encrypt it with the help of
Caesor's cipher
technique.

"Network and Infonnation Security".

(b) Demonstrate configuration of Firewall setting windows opera


ting system.
(c) Describe DMZ with suitable diagram.

(d) Describe PGP with suitable diagram.

(e) Find the output of the initial pennutation box when the
input is given in
hexadecimal as

0 X 0003 0000 0000 000}


2:!610
13 of -'I

5. Attempt 3n)· TWO of the following :


12
(a) Describe the ti.)llowing terms:

(i) Assels

(ii) Vulnerability

(iii) Risks

(b) Describe network based IDS with suitahle dingrnrn.

(c) Describe COBIT framework \\ith neat diagram.

6. Attempt any TWO of the following : 12


(a) Describe any three phases of virus with suitable example.

(b) Describe 'Kerberos ' protocol with suitable diagram.

(c) Describe following tenns :

(i) Packet filter Firewall

(ii) Application gateway

(iii) Circuit gateway


22620
21222
3 Hours/ 70 Marks
IS minulrs rxtn for car.h hour
Scat No. IIII II III
J11structio11s: (1) All Questions are compu/so,y.
(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Elcclronic Communication
devices are not permissible in Examination I Jail.

Marks

1. Attempt any FIVE of the following : 10

(a) Define following tenns :

(i) Confidentiality

(ii) Accountability

(b) Explain the tenns :

(i) Shoulder surfing

(ii) Piggybacking

(c) Define term cryptography.

(d) Classify following cyber crimes :

(i) Cyber stalking

(ii) Email harassment

11 of 4) P.T.O.
12 of 4J
22620
y two).
(e) Differentiate between viruses & wonns (An

(f) Define firewall. Enlist types of firewalls.


rity.
(g) Define AH & ESP with respect to IP secu

2. Attempt any THREE of the following : 12

(a) Define following terms :

(i) Operating System Security

(ii) Hot fix

(iii) Patch

(iv) Service pack

voice pattern in Biometrics.


(b) Explain the mechanism of fingerprint &
metric key cryptography.
(c) Differentiate between symmetric & asym

(d) Write & explain DES algorithm.

: 12
3. Attempt any THREE of the foJJowing
trol policy.
(a) Describe the features of DAC access con

INEERING" & convert given plain


(b) Consider plain text "COMPUTER ENG
with shift of position three - write
text into cipher text using 'Caesar Cipher'
down steps in encryption.

ork based IDS.


(c) Differentiate between host-based & netw

cation mechanism for access control.


(d) Define access control & explain authenti
22620 (3 of 4)

4. Attempt any THREE of the following : 12


(a) Enlist substitution techniques & explain any one.

(b) Explain DMZ.

(c) Differentiate between firewall & IDS.

(d) Explain Email security in SMTP.

(e) Explain Digital Signature in Cryptography.

5. Attempt any TWO of the following : 12

(a) Define Information. Explain basic principle of information security.

(b) Define & explain :

(i) Circuit Gateway

(ii) Honey Pots

(iii) Application Gateway

(c) Explain the working of Kerberos.

6. Attempt any TWO of the following : 12

(a) Explain DOS with neat diagram.

(b) Explain Public Key Infrastructure with example.

(c) Explain Policies, configuration & limitations of Firewall.

You might also like