0% found this document useful (0 votes)
10 views

Computer and Network Security

The document outlines the examination structure for the Diploma in Information Technology course, specifically focusing on Computer and Network Security. It includes instructions for students, a breakdown of questions across various topics such as viruses, biometric systems, cryptography, and intrusion detection systems, as well as the marks allocation for each question. The exam format emphasizes the importance of neat sketches, assumptions, and the use of non-programmable calculators.

Uploaded by

Om Tapdiya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
10 views

Computer and Network Security

The document outlines the examination structure for the Diploma in Information Technology course, specifically focusing on Computer and Network Security. It includes instructions for students, a breakdown of questions across various topics such as viruses, biometric systems, cryptography, and intrusion detection systems, as well as the marks allocation for each question. The exam format emphasizes the importance of neat sketches, assumptions, and the use of non-programmable calculators.

Uploaded by

Om Tapdiya
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 10
GOVT. POLYTECHNIC, AMRAVATL hienity Cou (An Autonomous Instinue of Govt. of Maharashtra) Write Haentty Code ‘TERM END EXAMINATION WINTER 2023 PROGRAMME:DIPLOMA IN INFORMATION TECHNOLOGY COURSE CODE & ITS TITLE: IF5469, COMPUTER & NETWORK SECURITY ‘Time Allowed: 03 Hrs Marks: 70 Instructions: 1. Write your Identity Code Number on question paper. 2. Alll questions are compulsory. Illustrate your answers with neat sketches wherever necessary Use of non-programmable calculator is permissible. ‘igures to the right indicate full marks. Assuine suitable additional data, - if necessary —and state the assumptions made, . Each sub-question in a question carries equal marks unless otherwise specified, Marks 8, Q.1 t0.Q.6 are as per COI to CO6 respectively Qu. A) Attempt any ONE 0) 4) List any four types of Viruses b) Define i) Intruders i) Insiders Q.1.B) Attempt any TWO 08, 4) Deseribe the TCP / IP hijacking attack. b) Explain the Trojan horse with example. ©) Describe Security basics with neat diagram, Sh Je) Q.2.A) Attempt any ONE. 0 4) List any two physiological and two behavioural biometric system. b) State ny two audit policies, Q.2.B) Attempt any THREE. 2 a) Explain the dumpster diving with example. b) Describe the signature and writing pattern of biometric system. ©) Compare the finger print and voice pattern on the basis of accuracy, safety, cost, universality, 4d) Deseribe the role based access control (RBAC) method, Q.3.A) Attempt any TWO. os a) State Brute force attack. b) List any four Transposition Techniques, ©) Define i) Plain text ii) Cipher text. Q3.B) Attempt any TWO. 08 4) Calculate the cipher text for the plain text “happy republic day” if the key given is “backtoschoolhome” by vernam cipher. 5) Compare Symmetric and Asymmetric cryptography on the basis of key, speed, size of Cipher text, use. ©) Explain the simple columnar transposition technique. Q.4.A) Attempt any ONE. a 4) Define Intrusion Detection System. b) Draw neat diagram of IDS. Q.4.B) Attempt any THREE. 2 2) Draw a neat labelled diagram of Intrusion detection system and describe its working. b) Compare the packet filter & circuit level gateway firewall on the basis of flexibility, intelligence, ©) Write the steps to configure the firewall 4) Compare the host based IDS and Network based IP on the basis of adaptability, training time use. Q5.A) Attempt any ONE. 2 4) State the two modes of ESP. b) State the Security features provided by PGP. Q.5.B) Attempt any ONE. a) Compare the Encapsulating Security payload (ESP) with transport and tunnel mode, b) Explain the 64 bit encoding in PEM (Privacy Enhanced Mail) with diagram. Q5) Attempt any ONE. 4) Write any six advantages of IPSec, ) Explain the Authentication Header (AH) with format. Q.6. Attempt any TWO. 08 ) Explain the need of Information Security Management System, b) Describe the digital forgery. ) Explain the identity theft /fraud with example. GOVT. POLYTECHNIC, AMRAVATL Wee entity (An Autonomous Institute of Govt. of Maharashtra) ae TERM END EXAMINATION SUMMER - 2023 PROGRAMME:DIPLOMA IN INFORMATION TECHNOLOGY COURSE CODE & ITS TITLE: IF 5469, COMPUTER & NETWORK SECURITY ‘Time Allowed: 03 Hrs Marks: 70 Instructions: Write your Identity Code Number on question paper. All questions are compulsory lustrate your answers with neat sketches wherever necessary. Use of non-programmable calculator is permissible. Figures to the right indicate full marks. Assume suitable additional data, - if necessary ~ and state the assumptions nade. . Each sub-question in a question carries equal marks unless otherwise specified. Marks 8.Q.1 to Q.6 are as per CO! to CO6 respectively Qu1. A) Attempt any ONE. a) Define Virus, State its phases b)Define i) threat ii) risk Q.L.B) Attempt any TWO 08 ) Write short note on i) Trapdoors. ii) Backdoor +) Explain the Denial of Service (DOS) attack in network ¢) Describe the security basics with neat diagram Q.2.A) Attempt any ONE. 02 a) State any two Audit policies. b) State shoulder surfing. Q.2.B) Attempt any THREE, 2 4) Explain the keystroke biometric system. b) Describe the role based access control (RBAC) method. ©) Deseribe the finger print attendance system 4) Write difference between finger print and retina biometric system on the basis of cost, accuracy, oN safety, universality, (8) Q.3.A) Attempt any TWO. os , a) Define i) Cryptography ii) Cryptoanalyst b) Draw a neat diagram of Encryption ©) Enlist any four transposition techniques. Q.3.B) Attempt any TWO. a) Deseribe Caesar Cipher technique. b) Describe S - Box, P—Box in DES algorithm, ) Explain the any two substitution techniques. Q4.A) Attempt any ONE, 4) State the need of honey pot. b) State the limitation of firewall. Q.4.B) Attempt any THREE, £8) Describe Demilitarized zone (DMZ) firewall with labelled diagram, 'b) Explain the host based IDS with diagram, ©) Write the goal of honey pot. Describe working of it. ) Explain the circuit level gateway firewall. Q.5.A) Attempt any ONE, a) State the need of IP security protocol. b) State the canonical conversion, Q.5.B) Attempt any ONE. 8) Explain the need of Security Association. b) Explain the X.509 certificate format. Q5.©) Attempt any ONE. a) Describe the working of Privacy Enhanced mail (PEM) b) Explain the SMTP Email protocol. Q.6. Attempt any TWO. 2) Explain the cyber laws related to the government. ) Explain the identity theft / fraud with example. ©) Write any six features of 18020000. 02 2 02 08 i ) (@) GOVT. POLYTECHNIC, AMRAVATI. ; (An Autonomous Institute of Govt, of Maharashtra) ‘Write Mentty Code TERM END EXAMINATION WINTER - 2022 PROGRAMME: DIPLOMA IN INFORMATION TECHNOLOGY. COURSE CODE & ITS TITLE : 1F5469- COMPUTER & NETWORK SECURITY ‘Time Allowed: 03 Hrs Max. Marks: 70 Instructions: Write your Identity Code Number on question paper. All questions are compulsory. hustrate your answers with neat sketches wherever necessary. Use of non-programmable calculator is permissible. Figures tothe right indicate full marks. Assume suitable additional data, - if necessary and state the assumptions made. Each sub-question in a question carries equal marks unless otherwise specified, QI to Q.6 are as per CO! to CO6 respectively Marks ex oveeye (A) Attempt any ONE. 02 a) State phases of virus. b) Enlist any four threats to security, (B) Attempt any TWO, 08 8) Describe the security basies with neat diagram, b) Explain following : i) TCPAP hijacking ii) Spoofing ©) Explain the any four types of virus, Q.2.(A) Attempt any ONE, 02 a) State Dumpster diving. b) Define authentication, (B) Attempt any THREE. 2 8) Compare the Finger print, Voice pattern on the basis of accuracy, safety, cost, universality, b) Describe the hand print biometric system, ©) Compare DAC and MAC audit policies. 6) Describe how to set the password. Q.3.(A) Attempt any TWO. 4 8) Enlist any four transposition techniques. b) State Brute force attack. ©) Define : i) Cryptography it) Cryptoanalyst (B) Attempt any TWO. 08 4) Derive the cipher text using vernam cipher if the plain text = “happy republic day” key = “backtoschoolhome” b) Compare symmetric and asymmetric cryptography. ©) Describe DES algorithm in brief. Q.4.(A) Attempt any ONE. a). State types of IDS. b) State limitation of firewall, (B) Attempt any THREE. ) Compare Host based IDS and network based IDS. b) Write the steps to configure firewall, ©). Describe Demilitarized zone (DMZ) firewall with labelled diagram. d) Describe the working of Intrusion detection system with neat diagram, Q.5.(A) Attempt any ONE. ) State security features provided by PGP. 'b) State the E-mail security protocol. (B) Attempt any ONE. 8) Describe the 64 bit encoding in PEM with diagram, b) Explain the Encapsulating security payload, (©) Attempt any ONE. a) Explain the X.509 certificate format. ) Describe the working of privacy Enhanced Mail (PEM). 66. Attempt any TWO. ) Explain the identity theft with example. b) Explain the need of cyber laws in today’s world, ©) Write the features of ISO 20000, 02 12 02 _ GOVT. POLYTECHNIC, AMRAVATI (An Autonomous Institute of Gest, of Maharashtra) END SEMESTER EXAMINATION ‘SAMPLE QUESTION PAPER-CURRICULUM-2018 DIPLOMA IN INFORMATION TECHNOLOGY, PROGRAMM COURSE CODE & THTLE: 1F5469 COMPUTER AND NETWORK SECURITY ‘Time Allowed: 3 Hours Marks: 70 Anseructions: 2 Weite you leatiy Code Number oa question paper 2. Allaucstons are compulory, } Lissa Your answer with nat shetches wherever necessary 4. Use of non-programmable calculator is perma 5. Figutes to the ight indicate fall mek $US fttabl addtional at, if necessary an sac he asunptions made 7 Eachsole-queston ia question caris egual maths unless ofr geet “LAY Attempt any ONE, (02) 4) Define the Virus. (Rt) by su ‘any four threats to security. (R) QU (B) Atempe any TWO (03) a) Describe the types of attack (U) 1) Esplain )DDOS atizek in network ii) Man i Middle tack a se ©) Explain the security basies (U/A) Q2 (A) Attempt any ONE, 2 9) ‘Stite characteristics of biometrics (R) ¥) Define) Authcatcation i entation (R) (B) Atempt any THREE (12) > Explain the working of fingerprint biomewe sytem with neat diagram. (U) ©) Exphin i) Signature and writing patter i) Keystroke © ©) Compare the Finger print, Voice patter on the basis of accuracy, safety, cost, universality (A) <#) Explain role based access control audit policies, (uray Q3 (A) Attempt any TWO (oy) 1 Define 1) Plain text si) Cipher text (RR) ©) Define Eneryption (R) © State the Cassar Cipher substitution technique .(R) G 318) Atemptany TWO (os) 2) Explain seganography with neat diagram (Ui) +) Compare Syimmevic and Asymmetric cryptography on the b we(A) of key.speui.size of cipher tent ©) Explain DES (Data Eneryption Sundard) algorithm (L/A) 4 (A) Attempt any ONE (02) a) Detine firewall. State its type (R) ») Define Intrusion Detection System. (R) 04 () Attempt say THREE, a 41 Describe working of eireuit level packet fitter firewall, (U) 'y Describe Intrusion detection System with neat diayram.(A) 1 Compare the Host based IDS and Network based IDS (A) jes and limitations of firewalls, (WA) 4) Write the pos} Q5(A) Atemptany ONE @ 8) Elis the 1P seeuity protacots(R) cthe need of Kerberos(R/U) by Q5(B) Attempt any ONE a) Describe pretty good privacy (PGP) email security protocol (U) bb) Deseribe the Kerberos working.(U) Q5 (©) Atemptany ONE co 41) Draw neat diagram of the ESP in tunnel mode and explain i. (A) 4) Explain the Authentication Header(A1) with frame format) Qo Avoniptamy TWO e «a) Describe the categories of crime against individual, yovernment, property.(U) 0) Describe the eyber harassment, identity of theti(A) ) Explain the need of eyber laws in today’s world.(U/A) ft YY CM Waterw) ede ste RNMENT POLYTECHNIC, AMRAVATI. al Ai \utonomous Institute of Govt. of Maharashtra) CoRR IDEVELOPMENT CELL PROFORMA -CDC-11 eo, 201819 CO MAPPING FOR SAMPLE QUESTION PAPER Neue mie Vear/Term: Carrieulum 201% Program: Information Technology Coure: Computer and Network Security Course Code: IES469 Name of Faculty: K P Ukey Conse Sub: Marks allotted with level (RyL TOTAL Oureomes Question | oa |p © dle f | MARKS No. Mtarks) COL QI | A(Any ONE) eRy 02(03) BeAny two) | 4U | 4A | eauvay osc) €O2 Q.2 | AAny One) | TR) AR) | TT 02(02) ay | ff Bay T4090 GA eatvay (04) Taree) €OS 3 Anytwe 9 3R aR | aR) 0403) un | 4 Any Two aU) GA) tay 504) (O48 O4 7 Any One aR aR rr au Any THREE | 40 GA Gq | uray 1204) COSQS "Any One) 2K) GR) / 02) u BoAny Oney | GU GU) aoa) CiAny One) GA) Gay ‘06(06) €00/0.6 0 Any Two a0) GA aguay _ 080 | sy Fotal may 70040) K-Remember U-U aderstand A-Application KP Ukey (Lect IT) Name & sign, of course teacher PL MD bulk) CPC tke

You might also like