MU Information Technology (Semester 6)
Information & Network Security
December 2014
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (b) Explain Digital Signature in short.
5 M
1 (c) Explain Digital Certificate.
5 M
1 (d) Explain ARP Spoofing.
5 M
1(a) What are the key principles of security. Explain with example?
5 M

2 (a) Explain DES in detail. What is double DES and Triples DES.
10 M
2 (b) Explain Secure E-Mail system with the example.
10 M

3 (a) What is a salami attack? List the controls against it.
5 M
3 (b) Explain CAPTCHA.
5 M
3 (c) Explain Covert Channel.
5 M
3 (d) Explain authentication in detail.
5 M

4 (a) Explain Kerberos in detail.
10 M
4 (b) Explain IDS, its types and their limitation? Why we need Hybrid IDS?
10 M

5 (a) Explain Knapsack Cryptosystem.
10 M
5 (b) Explain Risk analysis in detail.
10 M

6 (a) Explain firewall and its types with examples.
10 M
6 (b) Explain RSA crypto System in detail.
10 M

7 (a) Network Layer Attacks.
5 M
7 (b) Stream Cipher and Block Cipher.
5 M
7 (c) Web server Vulnerabilities.
5 M
7 (d) Tiger Hash
5 M



More question papers from Information & Network Security
SPONSORED ADVERTISEMENTS