Solve any one question Q.1(a, b) and Q.2(a, b)
1(a)
What are the categories of computer security.
5 M
1(b)
Illustrate the cryptanalysis with Dictionary attack.
5 M
2(a)
Explain various active attacks in detail.
5 M
2(b)
What is transposition cipher? Encrypt plain text " WE ARE THE BEST" using transposition cipher use key - " HEAVEN"
5 M
Solve any one question Q.3(a, b) and Q.4(a, b)
3(a)
Explain fesitel cipher in detail.
5 M
3(b)
Describe elliptic curve cryptography.
5 M
4(a)
Compare between symmetric key encryption and asymmetric key encryption.
5 M
4(b)
Explain digital signature algorithm.
5 M
Solve any one question Q.5(a, b) and Q.6(a, b,c)
5(a)
Explain working of PGP in detail.
9 M
5(b)
Describe IPsec protocol with its components & security services.
8 M
6(a)
Explain ISAKMP protocol for IP sec.
6 M
6(b)
What is VPN? Explain types of VPN.
6 M
6(c)
Expalin secure socket layer handshake protocol in brief.
5 M
Solve any one question Q.7(a, b,c) and Q.8(a, b,c)
7(a)
Explain types of Intrusion detection systems (IDS).
6 M
7(b)
List and explain any two password management practices.
6 M
7(c)
What are the various characteristics of firewall?
5 M
8(a)
Describe types of firewall in detail.
6 M
8(b)
Explain methods for intrusion detection system(IDS)
6 M
8(c)
What is Access control security service?
5 M
Solve any one question Q.9(a, b,c) and Q.10(a, b,c)
9(a)
How VoIP hacking is done by attackers? What are the counter measures for it?
7 M
9(b)
Identifying wireless network defenses & counter measures.
7 M
9(c)
What is hacking? Explain mobile hacking.
2 M
10(a)
How various wireless devices targeted by hackers in hacking the wireless network?
7 M
10(b)
Explain operation of various hacking devices.
7 M
10(c)
What is input validation Attack?
2 M
More question papers from Cyber Security