You are on page 1of 1

Tech Solution Computer Institute...

Mumbai University
Bachelor of Information Technology (B.Sc. IT)
Third year Semester V
Internet Security
April 2008

CON.
(3 Hours) [Total Marks: 100

N.B. 1. Question No.1 is Compulsory.


2. From the remaining (Q Nos. 2 to 7) attempt any four.
3. Draw neat labeled diagram whenever necessary
Q1 a) What do you mean by packet spoofing and packet sniffing? 05
b) Write a note on Incident Handling. 05
c) What are the components of security policy? 05
d) Explain what you mean by Plain Text, Cipher Text, Encryption and Decryption. 05
Q2 a) Enumerate the characteristics and components of a good security policy. 08
b) What are the different types of Viruses? Explain the structure of viruses. 08
c) Discuss in detail the classification of attacks. 04
Q3 a) State And explain different security models. 08
b) What firewalls can do? What firewall cannot do? Where should we 08
implement the firewall?
c) Write a note on Digging of Worms. 04
Q4 a) Discuss in detail Substitution Cipher and Transposition Cipher. 08
b) Explain the concept of Social Engineering. What methods are used by the 08
hackers for this purpose? Also mention the countermeasures.
c) How to protect computer against viruses. 04
Q5 a) What are various assets that should be protected against security attacks? 08
What are the threats against computer security?
b) Explain the following terms in detail: 08
(i) Authentication Failures
(ii) Protocol Failures.
c) How Trojan horse works? Explain. 04
Q6 a) What is difference between symmetric and asymmetric key 08
cryptography? Explain the Diffie-Hellmen Key Exchange Algorithm
with an example.
b) What are application gateways? Why are they known as proxy servers? 08
Explain their working in detail. How are they different from circuit
gateways?
c) 04
Explain Bots and Botnets, their application and misapplication.
Q7 Write short notes on the following: 20
Bugs and Back doors.
a)
b) Digital Signatures.
c) History of Virus.
d) Key Wrapping.

You might also like