VTU Computer Science (Semester 8)
Information and Network Security
May 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1(a) Briefly explain the components of issue specific policy.
8 M
1(b) Discuss various stages in a Incident response planning strategy.
8 M
1(c) Write and define different levels of controls in a security Architecture.
4 M

2(a) Explain different categories of Firewalls according to their processing mode.
10 M
2(b) Define any six design rules of Firewall.
6 M
2(c) Discuss content filter technology in a security.
4 M

3(a) Explain Host based intrusion detection system. Write its advantages and disadvantages.
8 M
3(b) Discuss port scanning and Vulnerability scanning tools.
8 M
3(c) Define the following terms with respect to intrusion detection system:
i) Alert ii) False positive iii) False negative iv) Confidence value
4 M

4(a) Describe any four attacks on a cryptosystem.
8 M
4(b) Explain substitution cipher technique. Discuss its weakness.
8 M
4(c) Define the following terms with respect to cryptography:
i) Encryption ii) Cipher iii) Keyspace iv) Strganography.
4 M

5(a) Write and explain the general format of a X.509 public key certificate.
8 M
5(b) List the difference between Kerberos version 4 and version 5.
6 M
5(c) Explain any Three Active security attacks.
6 M

6(a) Explain the PGP message generation and message reception technique.
10 M
6(b) Briefly explain the header fields of MME protocol.
5 M
6(c) What is S/MIME? What are the functions of S/SMIME?
5 M

7(a) Describe the SA parameters and SA selectors of a IPSec.
10 M
7(b) Draw and explain the header format of ESP protocol
6 M
7(c) Mention the application of IPSec.
4 M

8(a) Explain different phases in a SSL handshake protocol.
10 M
8(b) Define the key features of SET protocol.
4 M
8(c) Discuss the need and construction of a Dual-signature in a SET protocol
6 M



More question papers from Information and Network Security
SPONSORED ADVERTISEMENTS