1 (b)
Explain Digital Signature in short.
5 M
1 (c)
Explain Digital Certificate.
5 M
1 (d)
Explain ARP Spoofing.
5 M
1(a)
What are the key principles of security. Explain with example?
5 M
2 (a)
Explain DES in detail. What is double DES and Triples DES.
10 M
2 (b)
Explain Secure E-Mail system with the example.
10 M
3 (a)
What is a salami attack? List the controls against it.
5 M
3 (b)
Explain CAPTCHA.
5 M
3 (c)
Explain Covert Channel.
5 M
3 (d)
Explain authentication in detail.
5 M
4 (a)
Explain Kerberos in detail.
10 M
4 (b)
Explain IDS, its types and their limitation? Why we need Hybrid IDS?
10 M
5 (a)
Explain Knapsack Cryptosystem.
10 M
5 (b)
Explain Risk analysis in detail.
10 M
6 (a)
Explain firewall and its types with examples.
10 M
6 (b)
Explain RSA crypto System in detail.
10 M
7 (a)
Network Layer Attacks.
5 M
7 (b)
Stream Cipher and Block Cipher.
5 M
7 (c)
Web server Vulnerabilities.
5 M
7 (d)
Tiger Hash
5 M
More question papers from Information & Network Security