1(a)
Explain Different Birthday problems.
5 M
1(b)
What are the key principles of security?
5 M
1(c)
Compare and contrast SHA-1 and MD5.
5 M
1(d)
Explain Honey Pots.
5 M
2(a)
How flaw in TCP/IP can cause operating system to become vulnerable? Also explain how Kerberos are used for user authentication in windows?
10 M
2(b)
For the given values p=19,q=23 and e=3, find ? (n) and d using RSA algorithm.
10 M
3(a)
What is Buffer overflow and incomplete mediation in software security?
10 M
3(b)
Explain one time initialization process and processes in each round of advanced encryption standard.
10 M
4(a)
What is denial of service attack? What are the ways in which a user can mount dos attack on the system?
10 M
4(b)
Compare Packet Sniffing and Packet Spoofing. Explain session hijacking attack.
10 M
5(a)
Explain Multi Level Security Model. Also explain multi lateral security.
10 M
5(b)
What is Malware? Explain Salami and Linearization attacks.
10 M
6(a)
Explain Software Reverse Engineering. Also explain Digital Rights Management.
10 M
6(b)
Describe the different types of IDS and their limitations.
10 M
Write short notes on (any four) :-
7(a)
CAPTCHA
5 M
7(b)
Access Control Matrix
5 M
7(c)
Covert Channel
5 M
7(d)
Firewall
5 M
7(e)
RC4
5 M
More question papers from Cryptography & System Security