Solve any one question.Q1(a,b) Q2(a,b)

1(a)
List and briefly types of cryptanalytic attacks based on what is kown to the attacker.

6 M

Solve any one question.Q1(a,b) Q2(a,b)

1(a)
List and briefly define types of cryptanalytic attacks based on what is known to attacker.

6 M

1(b)
Determine ged (24140,

16762).

16762).

4 M

1(b)
Determine ged (24140,

16762)

16762)

4 M

2(a)
Using the extended Euclidean algorithm, find the multiplicative inverse of

i) 1234 mod 4321

ii) 24140 mod 40902

i) 1234 mod 4321

ii) 24140 mod 40902

6 M

2(a)
Using the extended Euclidean algorithm, find the multiplicative inverse of

i) 1234 mod 4321

ii) 24140 mod 40902

i) 1234 mod 4321

ii) 24140 mod 40902

6 M

2(b)
What is the difference between a monoalphabetic cipher and a polyaphabetic cipher?

4 M

2(b)
What is the difference between a monophabetic cipher and a polyalphabetic cipher?

4 M

Solve any one question.Q3(a,b) Q4(a,b)

3(a)
What characteristics are needed in a secure hash function?

6 M

Solve any one question.Q3(a,b) Q4(a,b)

3(a)
What characteristics are needed in a secure hash function?

6 M

3(b)
In what order should the signature function and the confidentiality function be applied to a message, and why?

4 M

3(b)
In what order should the signature function and the confidentiality function be applied to a message, and why?

4 M

4(a)
What are the properties a digital signature should have?

6 M

4(a)
What are the properties a digital signature should have?

6 M

4(b)
What four requirment were defined for Kerberos?

4 M

4(b)
What four requirement were defined for Kerberos?

4 M

Solve any one question.Q5(a,b) Q6(a,b)

5(a)
Give examples of applications of IPSec. What service are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?

8 M

Solve any one question.Q5(a,b) Q6(a,b)

5(a)
Give example of applications of IPSec. What services are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?

8 M

5(b)
What protocols comprise SSL. Draw a neat diagram? What is the difference between an SSL connection and SSL session?

8 M

5(b)
What protocols comprise SSL. Draw a neat digaram? What is the difference between an SSL connection and SSL session?

8 M

6(a)
What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record protocol transmission?

8 M

6(a)
What services are provided by the SSL Record Protocol? What steps are involved in the SSL Record Protocol transmission?

8 M

6(b)
What are three benefit that can be provided by an intrusion detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?

8 M

6(b)
What are three benefits that can be provided by an instruction detection system? What is the difference between statistical anomaly detection and rule-based intrusion detection?

8 M

Solve any one question.Q7(a,b) Q8(a,b)

7(a)
What is cybersquatting. Who are cybersqatters and how does in work.

8 M

Solve any one question.Q7(a,b) Q8(a,b)

7(a)
What is cybersquatting. Who are cycbersquatters and how does it work.

8 M

7(b)
What are social engineering attacks and classify and explain them?

8 M

7(b)
What are social engineering attacks and classify and explain them?

8 M

8(a)
What is cyberstalking. Explain cyberstalking and explain how it works.

8 M

8(a)
What is cyberstalking. Explain cyberstalking and explain how it works.

8 M

8(b)
Classify and expalin cybercrimes against property.

8 M

8(b)
Classify and explain cybercrimes against property.

8 M

Solve any one question.Q9,Q10

9
Write short notes on:

a) Viruses

b) Worms and logic bombs

c) Botnets

a) Viruses

b) Worms and logic bombs

c) Botnets

18 M

Solve any one question.Q9(a,b,c) &Q10(a,b,c)

9(a)
Write notes on:

Viruses

Viruses

6 M

9(b)
Worms and logic bombs

6 M

9(c)
Botnels

6 M

10
Write short note on:

a) Cloud computing and cybercrimes

b) Indian legal perspective on cybercrimes

c) Software Piracy

a) Cloud computing and cybercrimes

b) Indian legal perspective on cybercrimes

c) Software Piracy

18 M

10(a)
Write notes on:

Colud computing and cybercrimes

Colud computing and cybercrimes

6 M

10(b)
Indian legal perspective on cybercrrimes

6 M

10(c)
Software Piracy

6 M

More question papers from Information and Cyber Security