MU Information Technology (Semester 6)
Information & Network Security
December 2012
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Attempt any four questions:-
1 (a) What is primary advantage of SSL over IP sec? What is primary advantage of IP sec over SSL?
5 M
1 (b) What is a distinction between a polymorphic and a metamorphic worm? How might metamorphic software be used for a good instead of evil?
5 M
1 (c) What is validation error? How can such an error lead to a security flow?
5 M
1 (d) What is race condition? Discuss an example of race condition.
5 M
1 (e) Strength and DES depends on S-boxes in DES . Comment on the statement.
5 M

Explain technique (or fundamental concept behind) following attacks? Attempt any five questio
2 (a) Cross site scripting.
4 M
2 (b) ARP poisoning.
4 M
2 (c) Packet sniffing.
4 M
2 (d) Spoofing.
4 M
2 (e) Session hijacking.
4 M
2 (f) Ping to death.
4 M
2 (g) Root Traverse attack on web server
4 M

3 (a) Why is it a good idea to hash password that are stored in a file? What is a "salt" and why should a salt be used whenever passwords are hashed?
5 M
3 (b) Explain visual CAPTCHA.
5 M
3 (c) How are polyalphabetic ciphers implemented and how are they superior to monoalphabetic ciphers?
10 M

4 (a) Explain DMZ in enterprise wide networks. Explain various attacks possible on DMZ and its counter measure.
10 M
4 (b) Explain key generation encryption and decryption in the RSA algorithm.
10 M

5 (a) Identify security issues due to protocol weakness in following protocols.
(i) CSMA/CD
(ii) Ethernet with MTU 1500.
10 M
5 (b) What is difference between digital signature and digital certificate?
5 M
5 (c) Explain Diffie-Hellman key exchange algorithm.
5 M

6 (a) How is authentication achieved in pretty good privacy?
5 M
6 (b) What are the possible attacks on the password? Explain each in details.
5 M
6 (c) What is Access Control? How it is different from availability?
5 M
6 (d) Explain relationship between confidentiality, integrity and availability.
5 M

Write short notes on:-
7 (a) PKI.
5 M
7 (b) IDS/IPS.
5 M
7 (c) Firewall.
5 M
7 (d) Kerberos.
5 M



More question papers from Information & Network Security
SPONSORED ADVERTISEMENTS