1(a)
Briefly explain the components of issue specific policy.
8 M
1(b)
Discuss various stages in a Incident response planning strategy.
8 M
1(c)
Write and define different levels of controls in a security Architecture.
4 M
2(a)
Explain different categories of Firewalls according to their processing mode.
10 M
2(b)
Define any six design rules of Firewall.
6 M
2(c)
Discuss content filter technology in a security.
4 M
3(a)
Explain Host based intrusion detection system. Write its advantages and disadvantages.
8 M
3(b)
Discuss port scanning and Vulnerability scanning tools.
8 M
3(c)
Define the following terms with respect to intrusion detection system:
i) Alert ii) False positive iii) False negative iv) Confidence value
i) Alert ii) False positive iii) False negative iv) Confidence value
4 M
4(a)
Describe any four attacks on a cryptosystem.
8 M
4(b)
Explain substitution cipher technique. Discuss its weakness.
8 M
4(c)
Define the following terms with respect to cryptography:
i) Encryption ii) Cipher iii) Keyspace iv) Strganography.
i) Encryption ii) Cipher iii) Keyspace iv) Strganography.
4 M
5(a)
Write and explain the general format of a X.509 public key certificate.
8 M
5(b)
List the difference between Kerberos version 4 and version 5.
6 M
5(c)
Explain any Three Active security attacks.
6 M
6(a)
Explain the PGP message generation and message reception technique.
10 M
6(b)
Briefly explain the header fields of MME protocol.
5 M
6(c)
What is S/MIME? What are the functions of S/SMIME?
5 M
7(a)
Describe the SA parameters and SA selectors of a IPSec.
10 M
7(b)
Draw and explain the header format of ESP protocol
6 M
7(c)
Mention the application of IPSec.
4 M
8(a)
Explain different phases in a SSL handshake protocol.
10 M
8(b)
Define the key features of SET protocol.
4 M
8(c)
Discuss the need and construction of a Dual-signature in a SET protocol
6 M
More question papers from Information and Network Security