Nis All Question
Nis All Question
22620
3 Hours / 70 Marks Seat No.
Marks
[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Define the following terms :
(i) Authentication
(ii) Authorization
(b) Convert plain text into cipher text by using simple columnar technique of the
following sentence :
ALL IS WELL FOR YOUR EXAM.
(c) Describe packet filter router firewall with neat diagram.
(d) Explain working of fingerprint mechanism and its limitations.
_______________
23124
22620
3 Hours / 70 Marks Seat No.
Marks
1. Attempt any FIVE of the following : 10
(a) List any four virus categories.
(b) List any four biometric mechanisms.
(c) Define the following terms :
(i) Cryptography
(ii) Cryptanalysis
(d) Give examples of Active & Passive Attacks (two each).
(e) State the two types of firewall with its use.
(f) List two protocols in IP Sec. State its function.
(g) Classify the following cyber crime :
(i) Cyber terrorism against a government organization
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment
[1 of 4] P.T.O.
22620 [2 of 4]
2. Attempt any THREE of the following : 12
(a) Explain basic principles of information security.
(b) Explain any two password attacks.
(c) Describe digital signature technique using message digest.
(d) Explain steganography technique with an example.
P.T.O.
22620 [4 of 4]
22232
22620
3 Hours / 70 Marks Seat No.
Marks
(i) Cryptography
(ii) Cryptology
[1 of 4] P.T.O.
22620 [2 of 4]
(b) Define following with suitable example :
(i) DAC
(ii) MAC
(c) Differentiate between symmetric and asymmetric key cryptography. (any four
points)
(b) Convert plain text into cipher text by using Simple columner technique of the
following sentence :
(c) State any four difference between Firewall and Intrusion Detection System.
(a) Convert the given plain text, encrypt it with the help of Caesor’s cipher
technique.
(e) Find the output of the initial permutation box when the input is given in
hexadecimal as
(i) Assels
(ii) Vulnerability
(iii) Risks
_______________
P.T.O.
22620 [4 of 4]
12223
22620
3 Hours / 70 Marks Seat No.
Marks
(b) Explain working of biometric access control with any type of example.
[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Explain the term Authorization and Authentication with respect to security.
(b) Write an algorithm for simple columnar transposition technique and explain
with example.
(c) Describe DMZ with suitable example.
(d) Write short note on DAC & MAC.
_______________
21222
22620
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour
Marks
(i) Confidentiality
(ii) Accountability
(ii) Piggybacking
[1 of 4] P.T.O.
22620 [2 of 4]
(e) Differentiate between viruses & worms (Any two).
(iii) Patch
(b) Consider plain text “COMPUTER ENGINEERING” & convert given plain
text into cipher text using ‘Caesar Cipher’ with shift of position three - write
down steps in encryption.
(d) Define access control & explain authentication mechanism for access control.
22620 [3 of 4]
4. Attempt any THREE of the following : 12
_______________
P.T.O.
22620 [4 of 4]