1 (a)
What is Firewall? Describe the types of firewalls with their limitations.
10 M
1 (b)
Explain denial of service attacks in networks.
10 M
2 (a)
Explain Risk Analysis in detail.
10 M
2 (b)
Explain Digital Signature properly.
10 M
3 (a)
Explain secure e-mail with example.
10 M
3 (b)
Explain DES properly.
10 M
4 (a)
Explain Kerberos system properly.
10 M
4 (b)
Explain hash function with example.
5 M
4 (c)
Explain RSA algorithm.
5 M
5 (a)
Explain different kinds of threats to information security. Elaborate on information security goals.
10 M
5 (b)
List and explain the contents of security plan for administrative security.
10 M
6 (a)
Give difference between symmetric and asymmetric cryptography.
10 M
6 (b)
Explain control of access to generate objects in operating system.
10 M
Write short notes on (any four):-
7 (a)
Public Key Infrastructure.
5 M
7 (b)
Advanced Encryption Standards (AES).
5 M
7 (c)
Types of malicious code.
5 M
7 (d)
Convert Channel.
5 M
7 (e)
Non-malicious program errors.
5 M
7 (f)
Intrusion Detection System.
5 M
7 (g)
Distinguish between Vulnerability, Threat and Control.
5 M
More question papers from Information & Network Security