1 (a)
Consider an online Volting System. People will cast their votes through the internet. For this system identify vulnerability, threat and attack.
5 M
1 (b)
Differentiate between Multilevel and Multilateral security with the help of example.
5 M
1 (c)
Explain different types of malicious attacks.
5 M
1 (d)
Differentiate between SSL and IP Sec protocols.
5 M
2 (a)
Explain Needham Schroeder Authentication Protocol.
5 M
2 (b)
What is Digital Signature? Explain how it is created at the sender end and retrieved at receiver end. Differentiate digital signature from digital certificate.
10 M
3 (a)
Explain non malicious program errors with the help of examples.
10 M
3 (b)
What is Digital Right management? Explain DRM in Real world.
10 M
4 (a)
Explain the role of Firewall in securing a network. Describe different types of Firewall.
10 M
4 (b)
Explain secure Email and S/MIME.
10 M
Explain the technique behind following attacks:
5 (a)
ARP spoofing.
5 M
5 (b)
Packet Sniffing
5 M
5 (c)
Session Hijacking.
5 M
5 (d)
Cross-site request forgery
5 M
Write Short note on:
6 (a)
Windows Vulnerabilities.
5 M
6 (b)
Access control policies.
5 M
6 (c)
Linearization attack.
5 M
6 (d)
Distributed -Denial of Service attack.
5 M
More question papers from System & Web Security