VTU Computer Science (Semester 8)
Information and Network Security
June 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Describe an EISP and its components
10 M
1(b) With a neat diagram, explain briefly the major steps in contingency planning.
10 M

2(a) Discuss the different generation of firewalls.
6 M
2(b) Explain the important points for selecting the right firewall.
4 M
2(c) Explain the implementation of Virtual Private networks (VPN) in different method
10 M

3(a) Explain the advantages and disadvantages of NIDPS.
10 M
3(b) Describe the different IDPS detection method.
10 M

4(a) Explain Vernam Ciphere with an example.
10 M
4(b) Discuss the tools that are used in cryprography
10 M

5(a) Explain briefly OSI security architecture.
12 M
5(b) Discuss the difference between Kerberos version 4 and Kerberos version 5.
8 M

6(a) With a neat diagram, explain the overview of Kerberos.
10 M
6(b) Explain the procedure along with diagram to implement confidentiality in PGP.
10 M

7(a) Explain the architecture of the IPSec, also discuss the role of security associations.
10 M
7(b) Describe, how Authentication Header is implemented in Transport and Tunnel modes with a neat diagram.
10 M

8(a) Explain session state parameters and connection state parameters in detail.
10 M
8(b) Discuss the components of a SET with diagram.
10 M



More question papers from Information and Network Security
SPONSORED ADVERTISEMENTS