Solve any one question.Q1(a,b) Q2(a,b)
1(a)
List and briefly types of cryptanalytic attacks based on what is kown to the attacker.
6 M
Solve any one question.Q1(a,b) Q2(a,b)
1(a)
List and briefly define types of cryptanalytic attacks based on what is known to attacker.
6 M
1(b)
Determine ged (24140,
16762).
16762).
4 M
1(b)
Determine ged (24140,
16762)
16762)
4 M
2(a)
Using the extended Euclidean algorithm, find the multiplicative inverse of
i) 1234 mod 4321
ii) 24140 mod 40902
i) 1234 mod 4321
ii) 24140 mod 40902
6 M
2(a)
Using the extended Euclidean algorithm, find the multiplicative inverse of
i) 1234 mod 4321
ii) 24140 mod 40902
i) 1234 mod 4321
ii) 24140 mod 40902
6 M
2(b)
What is the difference between a monoalphabetic cipher and a polyaphabetic cipher?
4 M
2(b)
What is the difference between a monophabetic cipher and a polyalphabetic cipher?
4 M
Solve any one question.Q3(a,b) Q4(a,b)
3(a)
What characteristics are needed in a secure hash function?
6 M
Solve any one question.Q3(a,b) Q4(a,b)
3(a)
What characteristics are needed in a secure hash function?
6 M
3(b)
In what order should the signature function and the confidentiality function be applied to a message, and why?
4 M
3(b)
In what order should the signature function and the confidentiality function be applied to a message, and why?
4 M
4(a)
What are the properties a digital signature should have?
6 M
4(a)
What are the properties a digital signature should have?
6 M
4(b)
What four requirment were defined for Kerberos?
4 M
4(b)
What four requirement were defined for Kerberos?
4 M
Solve any one question.Q5(a,b) Q6(a,b)
5(a)
Give examples of applications of IPSec. What service are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
8 M
Solve any one question.Q5(a,b) Q6(a,b)
5(a)
Give example of applications of IPSec. What services are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
8 M
5(b)
What protocols comprise SSL. Draw a neat diagram? What is the difference between an SSL connection and SSL session?
8 M
5(b)
What protocols comprise SSL. Draw a neat digaram? What is the difference between an SSL connection and SSL session?
8 M
6(a)
What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record protocol transmission?
8 M
6(a)
What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record Protocol transmission?
8 M
6(b)
What are three benefit that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?
8 M
6(b)
What are three benefits that can be provided by an instruction detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?
8 M
Solve any one question.Q7(a,b) Q8(a,b)
7(a)
What is cybersquatting. Who are cybersqatters and how does in work.
8 M
Solve any one question.Q7(a,b) Q8(a,b)
7(a)
What is cybersquatting. Who are cycbersquatters and how does it work.
8 M
7(b)
What are social engineering attacks and classify and explain them?
8 M
7(b)
What are social engineering attacks and classify and explain them?
8 M
8(a)
What is cyberstalking. Explain cyberstalking and explain how it works.
8 M
8(a)
What is cyberstalking. Explain cyberstalking and explain how it works.
8 M
8(b)
Classify and expalin cybercrimes against property.
8 M
8(b)
Classify and explain cybercrimes against property.
8 M
Solve any one question.Q9,Q10
9
Write short notes on:
a) Viruses
b) Worms and logic bombs
c) Botnets
a) Viruses
b) Worms and logic bombs
c) Botnets
18 M
Solve any one question.Q9(a,b,c) &Q10(a,b,c)
9(a)
Write notes on:
Viruses
Viruses
6 M
9(b)
Worms and logic bombs
6 M
9(c)
Botnels
6 M
10
Write short note on:
a) Cloud computing and cybercrimes
b) Indian legal perspective on cybercrimes
c) Software Piracy
a) Cloud computing and cybercrimes
b) Indian legal perspective on cybercrimes
c) Software Piracy
18 M
10(a)
Write notes on:
Colud computing and cybercrimes
Colud computing and cybercrimes
6 M
10(b)
Indian legal perspective on cybercrrimes
6 M
10(c)
Software Piracy
6 M
More question papers from Information and Cyber Security