1(a)
What do you mean by computer security and cyber security?
2 M
1(b)
What is an intruder? Describe its classification.
2 M
1(c)
Explain Risk Management.
3 M
Solve any one question from Q.1(d) & Q.1(e)
1(d)
Discuss various types of security threats.
7 M
1(e)
Discuss principles of security in detail.
7 M
2(a)
What is substitution cipher? Explain with suitable example.
2 M
2(b)
What is Transposition Cipher? Explain with example.
2 M
2(c)
What is Steganography?How it differs from cryptography?
3 M
Solve any one question from Q.2(d) & Q.2(e)
2(d)
Explain RSA algorithm with an example.
7 M
2(e)
Describe Diffie-Hellman key exchange algorithm. Calculate secret shared key if n=17,x=3 and y=7. Also explain Bucket Brigade Attack.
7 M
3(a)
Define hash function.
2 M
3(b)
What is Message Authentication Code?
2 M
3(c)
Write short note on Digital Signature.
3 M
Solve any one question from Q.3(d) & Q.3(e)
3(d)
Explain SHA-1 Algorithm.
7 M
3(e)
What are Kerberos? Write the working Principle of Kerberos.
7 M
4(a)
What is spoofing?
2 M
4(b)
What is sniffing?
2 M
4(c)
Explain SQL injection with an example.
3 M
Solve any one question from Q.4(d) & Q.4(e)
4(d)
What is virus?How it works? Explain its phases of execution.
7 M
4(e)
Write short note on any two:-
i)Trojan Horse ii)Worm iii)Backdoor
i)Trojan Horse ii)Worm iii)Backdoor
7 M
5(a)
What is Hacking?
2 M
5(b)
What is Computer Forensics?
2 M
5(c)
Write short note Trusted System.
3 M
Solve any one question from Q.5(d) & Q.5(e)
5(d)
What is Firewall? Explain its various types.
7 M
5(e)
What is secure electronic transaction? Explain its various components.
7 M
More question papers from Network & Web Security