0% found this document useful (0 votes)
12 views

be_artificial-intelligence-and-data-science_semester-6_2023_march_cyber-security-2019-pattern

This document is an examination paper for a Cyber Security course, consisting of 6 questions with options to answer specific pairs. It includes instructions for candidates regarding the format and requirements for answers, such as drawing diagrams and assuming suitable data. The questions cover various topics in cyber security, including definitions, ciphers, and cryptography concepts.

Uploaded by

sujalswami0327
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

be_artificial-intelligence-and-data-science_semester-6_2023_march_cyber-security-2019-pattern

This document is an examination paper for a Cyber Security course, consisting of 6 questions with options to answer specific pairs. It includes instructions for candidates regarding the format and requirements for answers, such as drawing diagrams and assuming suitable data. The questions cover various topics in cyber security, including definitions, ciphers, and cryptography concepts.

Uploaded by

sujalswami0327
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 6] SEAT No.

8
23
PA-10121 [Total No. of Pages : 2

ic-
tat
[6009]-425

6s
1:4
T.E. (AI & DC) (Insem)

02 91
2:0
CYBER SECURITY

0
31
5/0 13
(2019 Pattern) (Semester - II) (317530)
0
4/2
Time : 1 Hour] [Max. Marks : 30
.23 GP

Instructions to the candidates :


E
80

1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6.

8
C

23
2) Neat diagrams must be drawn wherever necessary.

ic-
3) Figures to the right indicate full marks.
16

tat
4) Assume suitable data if necessary.
8.2

6s
.24

1:4
91
Q1) a) List and explain various elements of Information Security. [5]
49

2:0
30

b) Write difference between security and privacy. [5]


31
01

OR
02
4/2
GP

Q2) a) Enlist the security goals and mechanisms. [5]


5/0

b) Draw and explain operational security model for network security. [5]
CE
80

8
23
.23

Q3) a) Define cyber security. Explain Active and passive attack. ic-
[5]
16

tat
8.2

6s

b) Explain Feistel cipher. [5]


.24

1:4

OR
91
49

2:0

Q4) a) Explain ceaser cipher with example. [5]


30
31

b) Explain DES Algorithm. [5]


01
02
4/2
GP
5/0

Q5) a) Explain Monoalphabetic cipher with example. [5]


CE
80

b) Compaire symmetric key cryptography and Asymmetric key cryptography.


.23

[5]
16

OR
8.2

P.T.O.
.24
49
Q6) a) Use the transposition cipher to encrypt the message "WE ARE THE

8
23
BEST" use key "HEAVEN". [5]

ic-
b) Explain the following terms. [5]

tat
6s
i) Cryptography.

1:4
ii) Crypt analysis.

02 91
2:0
iii) Cryptology.

0
31
iv) 5/0 13
Crypto system.
0
4/2
.23 GP

v) Steganography.
E
80

8

C

23
ic-
16

tat
8.2

6s
.24

1:4
91
49

2:0
30
31
01
02
4/2
GP
5/0
CE
80

8
23
.23

ic-
16

tat
8.2

6s
.24

1:4
91
49

2:0
30
31
01
02
4/2
GP
5/0
CE
80
.23
16
8.2
.24

[6009]-425 2
49

You might also like