1 (a)
What are the different security goals ?
5 M
1 (b)
What is keyless transposition cipher?Give any example of Rail-fence cipher.
5 M
1 (c)
What are the different parameters to measure the accuracy of biometric techniques? Also write the application of biometrics.
5 M
1 (d)
What are the various types of IP Spoofing?
5 M
2 (a)
Explain the TCP/IP vulnerabilities at each layer.
10 M
2 (b)
What are the typical characteristics of enterprise wide networks ? Explain its different router vulnerabilities and firewall vulnerabilities.
10 M
3 (a)
Explain A5/1 algorithm in detail.
10 M
3 (b)
What are passive and active attacks? Categorize these attacks and explain one example of each.
10 M
4 (a)
What is SHA-1?Explain different steps of working in SHA-1.
10 M
4 (b)
What are the different methods of malware detection? Explain with their advantages and disadvantages.
10 M
5 (a)
What is Bell-LaPadula? How does Bell-LaPadula model works?
10 M
5 (b)
Explain different method to commit a session hijack and methods to prevent session hijacking.
10 M
6 (a)
Why Secure Socket Layer is needed? What are the different features SSL provide? Explain how SSL works?
10 M
6 (b)
How does Kerberos work? Explain with example.
10 M
Write short notes on the following
7 (a)
Multiple DES
10 M
7 (b)
Software Reverse Engineering (SRE) and prevention of SRE
10 M
More question papers from Cryptography & System Security