You are on page 1of 1

Visit hiddencomputertricks.blogspot.com for more...

Mumbai University
Bachelor of Information Technology (B.Sc. IT)
Third year Semester V
Internet Security
October 2008

CON. 4836-08 GL-5477


(3 Hours) [Total Marks: 100

N.B. 1. Question No.1 is Compulsory.


2. From the remaining (Q Nos. 2 to 7) attempt any four.
3. Draw neat labeled diagram whenever necessary
Q1 Explain the Following un detail:- 20
a) Incident Handling
b) Digging for worms
c) Risk Assessment
d) Digital Envelop
e) Botnets.
Q2 a) Explain the term security policy. Also enumerate its characteristics and 08
components.
b) Explain the concept of „social engineering‟. What methods do the hackers use 06
for this purpose? Also mention the countermeasures.
c) Write about the concept of filtering by service? 06
Q3 a) Explain the term Cryptography. Show the different techniques of cryptography. 08
What is firewall? Explain the concept of “Distributed Firewall”.
b) Explain the concept of “Protocol Failure”. Illustrate your points with three-way- 05
c) handshake of TCP. 06
Q4 a) What are the different types of viruses? Give the structure of virus. How will 08
you secure your system from virus attack?
b) Explain the strategies for secure network in detail. 06
c) What is malicious software? Compare Virus, Worms and Trojan horse. 06
Q5 a) Explain the term “Packet Filter” and explain the circuit level filter with SOCKS 08
implementation.
b) Explain any of the symmetric cryptography algorithms in detail. 06
c) Explain the filtering services for Telnet. 06
Q6 a) What is Message Digest? Explain any message digest algorithm in detail. 08
b) “In order to understand how secure any corporate network is, both inside and 06
outside attacks are required to be purposefully performed on it”. Comment and
explain your views on this statement with logical reasoning.
c) What is a digital signature? Show its implementation. 06
Q7 Distinguish between the following:- 20
Traditional Firewall and Distributed Firewall
a)
b) Active and Passive attack
c) Symmetric and Asymmetric cryptography
d) Sniffing and Spoofing.

Visit http://www.bscitmumbai.blogspot.com for more...

You might also like