0% found this document useful (0 votes)
29 views

Prelim-2

Additional questions for national security

Uploaded by

sc597442
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Prelim-2

Additional questions for national security

Uploaded by

sc597442
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Roll No.

Course code: 22620

MARATHAWADA MITRAMANDAL’S POLYTECHNIC,


THERGAON, PUNE-33
Academic Year 2024-2025
Preliminary Examination-2
Program Name: Computer Engineering Program Code: CO6I
Semester: Sixth
Course: Network and Information Security Date: - 19/04/2025
Marks: 50 Duration: 2 hours
Instructions:
1. All questions are compulsory
2. Illustrate your answers with neat sketches whenever necessary
3. Figures to the right indicates full marks
4. Assume suitable data if necessary

Q. 1) Attempt ALL of the following 10 Marks


a. Define computer security and state it’s need. (CO1)
b. State the meaning of hacking. (CO5)
c. Describe sniffing attack (CO1)
d. Define terms qualitative and quantitative risk analysis (CO1)
e. Explain the term Authorization (CO1)
Q. 2) Attempt ALL of the following. 16 Marks
a. Explain Ceaser’s Cipher substitution technique with suitable example. (CO3)
b. Explain Honey pots (CO4)
c. Write an algorithm for simple columnar transposition technique and explain
with example (CO3)
d. Explain working of biometric access control with any type of example.(CO2)
Q. 3) Attempt ALL of the following. 24 Marks
a. Explain Host based IDS. (CO3)
b. Write a brief note on firewall configurations..(CO4)
c. Explain creation and verification of digital signature.(CO3)
d. Explain any three criteria for classification of information.(CO1)
Practical Questions asked in examination

1. Consider a plain text “Computer Security” encrypt it with the help of Rail Fence
Technique also write the algorithm (winter14)
2. Describe Caesar’s cipher technique. Write its algorithm with an example. (w14)
3. Describe rail fence technique. Convert “I am a student” into cipher text using rail fence
method. (s15)
4. Explain simple columnar transporation technique with algorithm and example(s16)
5. Explain transposition technique. Convert plain text to cipher text using Rail Fence
technique “COMPUTER SECURITY” (w16)
6. Define Caesar cipher. Write its algorithm and convert “COMPUTER SECURITY” using
Caesar cipher(w16)
7. Convert plain text into cipher text by using simple columnas technique of the following
sentence: ‘ALL IS WELL FOR YOUR EXAM’(s17)
8. Explain transposition technique. Convert plain text to Cipher text using Rail Fence
technique “COMPUTER ENGINEERING”.(w17)
9. Explain simple columnar transposition technique with algorithm and example. (w17)
10. Decipher a message: “TSACT SGCEB HISRM SELNV ISEEE AVITP” using a Rail
fence using 10 columns & 3 rails & retrieve original massage(s18)

You might also like