1 (a)
Explain with examples, Vulnerability, Threat and attacks.
8 M
1 (b)
Discuss with examples the following:
i) ARP spoofing
ii) TCP syn flood attack
iii) Port scanning
iv) IP spoofing
i) ARP spoofing
ii) TCP syn flood attack
iii) Port scanning
iv) IP spoofing
12 M
2 (a)
Discuss with an example how knapsack is used in cryptography.
10 M
2 (b)
Explain the roles of the different servers in Kerberos protocol. How does the user get authenticated to the different servers?
10 M
3 (a)
Define access control list and capability list and compare them. Explain the Bell La Padula access control model.
10 M
3 (b)
Differentiate between the tunnel mode and transport mode of IPSec. Explain how integrity is achieved.
10 M
4 (a)
List the different protocols of SSL. Explain in detail Handshake protocol. How does server get authenticated to client?
10 M
4 (b)
List and explain the different TCP/IP vulnerabilities.
10 M
5 (a)
What are the different approaches to Software Reverse Engineering?
10 M
5 (b)
With the help of example explain cross-site scripting and SQL injection attacks.
10 M
Write a short notes on:
6 (a)
Linux File Security.
5 M
6 (b)
Phishing and Pharming techniques
5 M
6 (c)
Federated Identity Management.
5 M
6 (d)
Biometric authentication schemes.
5 M
More question papers from System & Web Security