MU Information Technology (Semester 6)
Information & Network Security
December 2011
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


1 (a) What is Firewall? Describe the types of firewalls with their limitations.
10 M
1 (b) Explain denial of service attacks in networks.
10 M

2 (a) Explain Risk Analysis in detail.
10 M
2 (b) Explain Digital Signature properly.
10 M

3 (a) Explain secure e-mail with example.
10 M
3 (b) Explain DES properly.
10 M

4 (a) Explain Kerberos system properly.
10 M
4 (b) Explain hash function with example.
5 M
4 (c) Explain RSA algorithm.
5 M

5 (a) Explain different kinds of threats to information security. Elaborate on information security goals.
10 M
5 (b) List and explain the contents of security plan for administrative security.
10 M

6 (a) Give difference between symmetric and asymmetric cryptography.
10 M
6 (b) Explain control of access to generate objects in operating system.
10 M

Write short notes on (any four):-
7 (a) Public Key Infrastructure.
5 M
7 (b) Advanced Encryption Standards (AES).
5 M
7 (c) Types of malicious code.
5 M
7 (d) Convert Channel.
5 M
7 (e) Non-malicious program errors.
5 M
7 (f) Intrusion Detection System.
5 M
7 (g) Distinguish between Vulnerability, Threat and Control.
5 M



More question papers from Information & Network Security
SPONSORED ADVERTISEMENTS