1(a)
Describe an EISP and its components
10 M
1(b)
With a neat diagram, explain briefly the major steps in contingency planning.
10 M
2(a)
Discuss the different generation of firewalls.
6 M
2(b)
Explain the important points for selecting the right firewall.
4 M
2(c)
Explain the implementation of Virtual Private networks (VPN) in different method
10 M
3(a)
Explain the advantages and disadvantages of NIDPS.
10 M
3(b)
Describe the different IDPS detection method.
10 M
4(a)
Explain Vernam Ciphere with an example.
10 M
4(b)
Discuss the tools that are used in cryprography
10 M
5(a)
Explain briefly OSI security architecture.
12 M
5(b)
Discuss the difference between Kerberos version 4 and Kerberos version 5.
8 M
6(a)
With a neat diagram, explain the overview of Kerberos.
10 M
6(b)
Explain the procedure along with diagram to implement confidentiality in PGP.
10 M
7(a)
Explain the architecture of the IPSec, also discuss the role of security associations.
10 M
7(b)
Describe, how Authentication Header is implemented in Transport and Tunnel modes with a neat diagram.
10 M
8(a)
Explain session state parameters and connection state parameters in detail.
10 M
8(b)
Discuss the components of a SET with diagram.
10 M
More question papers from Information and Network Security