1(a)
What are eight security mechanisms to implement security?
5 M
1(b)
Distinguish between attack, vulnerability and access control.
5 M
1(c )
What is Feistal cipher?
5 M
1(d)
What is CAPTCHA?
5 M
2(a)
What is race condition? Describe an example of a race condition?
10 M
2(b)
What is distinction between polymorphic and metamorphic worms?
5 M
2(c)
What is double transposition cipher? Describe it with example.
5 M
3(a)
What are block cipher algorithmic modes? Describe any two modes.
10 M
3(b)
What are Firewall design principles?
10 M
4(a)
What is principle behind One-Time-Pads (OTPs)? Why they are highly secure?
10 M
4(b)
What is biometric Authentication? what are two parameters defined for biometric measurement?
10 M
5(a)
Describe different vulnerabilities in enterprise network with real examples.
10 M
5(b)
What is Digital rights management? Describe DRM for P2P applications?
10 M
6(a)
What are the strengths and limitations of intrusion detection system?
10 M
6(b)
using RSA encrypt the following (i)p=3,q=11,e=7,M=12(ii)p=7,q=11,e=17,M=25(iii) Find the corresponding ds for (i) and (ii)
10 M
Solve any three :-
7(a)
AES
7 M
7(b)
SSL/TLS
7 M
7(c)
Honeypots
7 M
7(d)
MD5
7 M
More question papers from Cryptography & System Security