You are on page 1of 1

Reg no : SRI SUBRAMANYA COLLEGE OF ENGG. & TECH., PALANI. M.

E I YEAR CSE INTERNAL TEST-1 NE7202- NETWORK AND INFORMATION SECURITY Max Marks: 50 PARTA ! " 2 # 10$
1. What is information security? 2. Distinguish between DOS and DDOS. 1. What are the threats to information security? 2. What are the types of network attacks? !. Differentiate between symmetric and asymmetric key cryptography. Date: . .14/FN

A%&'() *++ ,-(&./0%&

PART- B

20 M*)3&$

6. Explain XHTML syntax and semantics in detail. List out some of the fundamental XHTML Tags. 4$ OR$ 7. Write a XH !" program for On#ine Rai#way Reser$ation. he %rogram shou#d contain XH !" form& 'rame and ab#e tags. 4$ 4. ()p#ain H % re*uest and response messages in detai#. 15$ OR$ 6. ()p#ain the $arious types of +SS with e)amp#es. 15$ 10. Write a ,a$a script program for sorting an array e#ements. 15$ OR$ 11. ()p#ain the $arious bui#d-in ob.ects and debuggers in ,a$a Script. 15$

S.*77 /% 89*):(

HOD;CSE

UNIT I INTRODUCTION 6 /n O$er$iew of +omputer Security-Security Ser$ices-Security !echanisms-Security /ttacks/ccess +ontro# !atri)& %o#icy-Security po#icies& +onfidentia#ity po#icies& 0ntegrity po#icies and Hybrid po#icies. UNIT II CRYPTOSYSTEMS & AUTHENTICATION 6 +#assica# +ryptography-Substitution +iphers-permutation +iphers-1#ock +iphers-D(S- !odes of Operation- /(S-"inear +ryptana#ysis& Differentia# +ryptana#ysis- Hash 'unction - SH/ 234!essage /uthentication +odes-H!/+ - /uthentication %rotoco#s 5

You might also like