0% found this document useful (0 votes)
86 views16 pages

Nis All Question

The document outlines a series of examination questions related to computer security, cryptography, and network security. It includes instructions for answering the questions, which cover topics such as types of attacks, biometric systems, firewalls, and cryptographic techniques. The exam is structured into multiple sections, requiring students to demonstrate their understanding of various security concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views16 pages

Nis All Question

The document outlines a series of examination questions related to computer security, cryptography, and network security. It includes instructions for answering the questions, which cover topics such as types of attacks, biometric systems, firewalls, and cryptographic techniques. The exam is structured into multiple sections, requiring students to demonstrate their understanding of various security concepts and practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

23242

22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.

Marks

1. Attempt any FIVE of the following : 10

(a) Differentiate between viruses & worms.

(b) State any four advantages of Biometrics.


(c) Explain the term cryptanalysis.
(d) Define term cyber crime.
(e) Explain the term assets.
(f) State any four limitations of firewall.
(g) Explain working of Kerberos in short.

2. Attempt any THREE of the following : 12


(a) Enlist types of Biometrics & explain any one Biometrics type in detail.
(b) Explain DOS with neat diagram.
(c) Differentiate between symmetric and asymmetric cryptography.
(d) Illustrate digital signature and explain it with neat diagram.

[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Define the following terms :
(i) Authentication
(ii) Authorization
(b) Convert plain text into cipher text by using simple columnar technique of the
following sentence :
ALL IS WELL FOR YOUR EXAM.
(c) Describe packet filter router firewall with neat diagram.
(d) Explain working of fingerprint mechanism and its limitations.

4. Attempt any THREE of the following : 12


(a) Explain Caesar’s cipher substitution technique with example.
(b) Describe host based IDS with its advantages and disadvantages.
(c) Define Hacking. Explain different types of Hackers.
(d) Explain the features of IDS technique.
(e) Differentiate between substitution and transposition techniques ?

5. Attempt any TWO of the following : 12


(a) Explain active attack and passive attack with suitable example.
(b) Describe the DMZ with suitable example.
(c) Explain working principle of SMTP in detail.

6. Attempt any TWO of the following : 12


(a) Explain any three criteria for classification of information.
(b) Describe COBIT framework with neat sketch.
(c) Explain policies, configuration & limitations of firewall in detail.

_______________
23124
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic Communication
devices are not permissible in Examination Hall.

Marks
1. Attempt any FIVE of the following : 10
(a) List any four virus categories.
(b) List any four biometric mechanisms.
(c) Define the following terms :
(i) Cryptography
(ii) Cryptanalysis
(d) Give examples of Active & Passive Attacks (two each).
(e) State the two types of firewall with its use.
(f) List two protocols in IP Sec. State its function.
(g) Classify the following cyber crime :
(i) Cyber terrorism against a government organization
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment

[1 of 4] P.T.O.
22620 [2 of 4]
2. Attempt any THREE of the following : 12
(a) Explain basic principles of information security.
(b) Explain any two password attacks.
(c) Describe digital signature technique using message digest.
(d) Explain steganography technique with an example.

3. Attempt any THREE of the following : 12


(a) Describe :
(i) Piggybacking
(ii) Dumpster diving
(b) Consider plain text “CERTIFICATE” and convert it into cipher text using
Caesar Cipher with a shift of position 4. Write steps for encryption.
(c) State the use of packet filters. Explain its operation.
(d) State the features of (i) DAC (ii) MAC.

4. Attempt any THREE of the following : 12


(a) Convert the given plain text into cipher text using simple columnar technique
using the following data :
 Plain text : NETWORK SECURITY
 Number columns : 06
 Encryption key : 632514
(b) State the working principle of application gateways. Describe circuit gateway
operation.
(c) Describe DMZ with an example.
(d) State the use of Digital Certificates. Describe the steps for digital certificate
creation.
(e) Considering DES, find the output of the initial permutation box when the
input is given in hexadecimal as, 0×0000 0080 0000 0002
22620 [3 of 4]
5. Attempt any TWO of the following : 12
(a) State the criteria for information classification. Explain information
classification.
(b) State the features of the following IDS :
(i) Network based IDS
(ii) Host based IDS
(iii) Honey pots
(c) Explain step-by-step procedure of Kerberos with diagrams.

6. Attempt any TWO of the following : 12


(a) Explain the following attacks using an example :
(i) Sniffing (ii) Spoofing (iii) Phishing
(b) Describe ITIL framework with different stages of life cycle.
(c) State and explain 3 types of firewall configurations with a neat diagram.
_______________

P.T.O.
22620 [4 of 4]
22232
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.

Marks

1. Attempt any FIVE of the following : 10

(a) Compare virus and logic bomb. (any two points).

(b) Identify any four individual user responsibilities in computer security.

(c) Define following terms :

(i) Cryptography

(ii) Cryptology

(d) Construct digital signature using cryptool.

(e) List any two types of active and passive attacks.

(f) State any two policies of the firewall.

(g) List any four types of cybercrimes.

2. Attempt any THREE of the following : 12

(a) Describe CIA model with suitable diagram.

[1 of 4] P.T.O.
22620 [2 of 4]
(b) Define following with suitable example :

(i) DAC

(ii) MAC

(c) Differentiate between symmetric and asymmetric key cryptography. (any four
points)

(d) Explain steganography technique with suitable example.

3. Attempt any THREE of the following : 12

(a) Describe piggy backing and shoulder surfing.

(b) Convert plain text into cipher text by using Simple columner technique of the
following sentence :

“Maharastra State Board of Technical Education”

(c) State any four difference between Firewall and Intrusion Detection System.

(d) Describe any four password selection criteria.

4. Attempt any THREE of the following : 12

(a) Convert the given plain text, encrypt it with the help of Caesor’s cipher
technique.

“Network and Information Security”.

(b) Demonstrate configuration of Firewall setting windows operating system.

(c) Describe DMZ with suitable diagram.

(d) Describe PGP with suitable diagram.

(e) Find the output of the initial permutation box when the input is given in
hexadecimal as

0  0003 0000 0000 0001


22620 [3 of 4]

5. Attempt any TWO of the following : 12

(a) Describe the following terms :

(i) Assels

(ii) Vulnerability

(iii) Risks

(b) Describe network based IDS with suitable diagram.

(c) Describe COBIT framework with neat diagram.

6. Attempt any TWO of the following : 12

(a) Describe any three phases of virus with suitable example.

(b) Describe ‘Kerberos’ protocol with suitable diagram.

(c) Describe following terms :

(i) Packet filter Firewall

(ii) Application gateway

(iii) Circuit gateway

_______________

P.T.O.
22620 [4 of 4]
12223
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.

Marks

1. Attempt any FIVE of the following : 10

(a) Define computer security and state it’s need.

(b) Explain shoulder surfing attack.

(c) Explain the term cryptography.

(d) State the meaning of hacking.

(e) Describe sniffing attack.

(f) Explain need for firewall.

(g) Explain use of PCI DSS.

2. Attempt any THREE of the following : 12

(a) Define Risk. Describe qualitative and quantitative risk analysis.

(b) Explain working of biometric access control with any type of example.

(c) Explain Ceaser’s Cipher substitution technique with suitable example.

(d) Describe DES algorithm with suitable example.

[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Explain the term Authorization and Authentication with respect to security.
(b) Write an algorithm for simple columnar transposition technique and explain
with example.
(c) Describe DMZ with suitable example.
(d) Write short note on DAC & MAC.

4. Attempt any THREE of the following : 12


(a) Write a short note on steganography.
(b) Explain Honey pots.
(c) Explain Host based IDS.
(d) Describe working principle of SMTP.
(e) Explain creation and verification of digital signature.

5. Attempt any TWO of the following : 12


(a) Explain any three criteria for classification of information.
(b) List types of firewall and explain any one of them.
(c) Explain IP sec security with help of diagram.

6. Attempt any TWO of the following : 12


(a) Define virus and describe the phases of virus.
(b) Explain Kerberos with help of suitable diagram.
(c) Write a brief note on firewall configurations.

_______________
21222
22620
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour

Instructions : (1) All Questions are compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic Communication
devices are not permissible in Examination Hall.

Marks

1. Attempt any FIVE of the following : 10

(a) Define following terms :

(i) Confidentiality

(ii) Accountability

(b) Explain the terms :

(i) Shoulder surfing

(ii) Piggybacking

(c) Define term cryptography.

(d) Classify following cyber crimes :

(i) Cyber stalking

(ii) Email harassment

[1 of 4] P.T.O.
22620 [2 of 4]
(e) Differentiate between viruses & worms (Any two).

(f) Define firewall. Enlist types of firewalls.

(g) Define AH & ESP with respect to IP security.

2. Attempt any THREE of the following : 12

(a) Define following terms :

(i) Operating System Security

(ii) Hot fix

(iii) Patch

(iv) Service pack

(b) Explain the mechanism of fingerprint & voice pattern in Biometrics.

(c) Differentiate between symmetric & asymmetric key cryptography.

(d) Write & explain DES algorithm.

3. Attempt any THREE of the following : 12

(a) Describe the features of DAC access control policy.

(b) Consider plain text “COMPUTER ENGINEERING” & convert given plain
text into cipher text using ‘Caesar Cipher’ with shift of position three - write
down steps in encryption.

(c) Differentiate between host-based & network based IDS.

(d) Define access control & explain authentication mechanism for access control.
22620 [3 of 4]
4. Attempt any THREE of the following : 12

(a) Enlist substitution techniques & explain any one.

(b) Explain DMZ.

(c) Differentiate between firewall & IDS.

(d) Explain Email security in SMTP.

(e) Explain Digital Signature in Cryptography.

5. Attempt any TWO of the following : 12

(a) Define Information. Explain basic principle of information security.

(b) Define & explain :

(i) Circuit Gateway

(ii) Honey Pots

(iii) Application Gateway

(c) Explain the working of Kerberos.

6. Attempt any TWO of the following : 12

(a) Explain DOS with neat diagram.

(b) Explain Public Key Infrastructure with example.

(c) Explain Policies, configuration & limitations of Firewall.

_______________

P.T.O.
22620 [4 of 4]

You might also like