1 (a)
What is Multilateral Security?
5 M
1 (b)
Compare Stream and Block encryption algorithms.
5 M
1 (c)
Distinguish between attack, vulnerability and access control.
5 M
1 (d)
What is Buffer overflow and incomplete mediation in Software Security?
5 M
2
The following questions are based on scenario in which encrypted data are passed between Alice and Bob using RSA algorithm. Alice's public key is {17, 23} and Bob's public key is {5,23}. Assume that no one knows the private keys but the original owners.
i) Encrypt the message M=7 using Bob's public key.
ii) What should Alice have to do to decrypt the message from Q-2 a?
iii) What would Bob have to do to decrypt the message from Q-2 a?
iv) What is Alice's private key?
v) What is Bob's private key?
i) Encrypt the message M=7 using Bob's public key.
ii) What should Alice have to do to decrypt the message from Q-2 a?
iii) What would Bob have to do to decrypt the message from Q-2 a?
iv) What is Alice's private key?
v) What is Bob's private key?
20 M
3 (a)
Explain how threat precursors are used for Reconnaissance of network.
10 M
3 (b)
Upon reception of a digital certificate, how one can decide whether to trust that or not.
10 M
4 (a)
Explain Physiological and Behavioral biometric techniques with example.
10 M
4 (b)
Write short note on Access control List (ACL) and Capabilities.
10 M
5 (a)
What is a firewall? Explain different type of firewall.
10 M
5 (b)
Explain various types of port scan.
10 M
6 (a)
What is spoofing? Explain ARP spoofing.
5 M
6 (b)
What is SQL Injection? Give Example.
5 M
6 (c)
Compare packet sniffing and packet spoofing. Explain the session hijacking attack.
10 M
Write short notes on any two
7 (a)
Compare AES and DES
10 M
7 (b)
Explain different Security Mechanisms.
10 M
7 (c)
Various ways for Memory and Address Protection.
10 M
More question papers from Cryptography & System Security