1(a)
Explain Different security mechanisms.
5 M
1(b)
Explain the steps used to construct knapsack cryptosystem.
5 M
1(c)
What is Personal Firewall?
5 M
1(d)
Explain different Targeted Malicious code.
5 M
2(a)
What is difference between substitution cipher and transposition cipher? Explain additive and double transposition cipher with example?
10 M
2(b)
What are the different types of vulnerabilities, threat and access control? Give example of each.
10 M
3(a)
What is denial of service attack? What are the ways in which an attack can mount a DOS/DDOS attack on system?
10 M
3(b)
Write short note on Access control lists and capabilities?
10 M
4(a)
Explain different authentication methods and protocols?
10 M
4(b)
Explain Cryptographic hash function criteria and compare MD5 and SHA-1?
10 M
5(a)
Explain different types of data link layer vulnerability.
10 M
5(b)
Explain various types of port scan?
10 M
6(a)
Explain methods used to commit session hijack. What is SQL Injection? Give example.
10 M
6(b)
What are network level threats to web server? Explain.
10 M
Write short note on the following:-
7(a)
Digital Signature
5 M
7(b)
Multilateral security
5 M
7(c)
Digital Rights Management
5 M
7(d)
Various ways of memory and address protection
5 M
More question papers from Cryptography & System Security