You are on page 1of 3

Network Security (April/May-2012, Set-1) JNTU-Hyderabad

Code No: 09A60503/R09


B.Tech III Year II Semester Examinations

April/May - 2012
NETWORK SECURITY

S.1

Set-1
Solutions

( Common to CSE, IT )

Time: 3 Hours

Max. Marks: 75
Answer any FIVE Questions
All Questions carry equal marks
---

1.

2.

3.

4.

(a)

Discuss about the internet standards. (Unit-I, Topic No. 1.5)

(b)

Explain the various types of security attacks. [15] (Unit-I, Topic No. 1.1)

(a)

Briefly explain block cipher modes of operation. (Unit-II, Topic No. 2.3)

(b)

Explain the location of encryption devices. [15] (Unit-II, Topic No. 2.4)

(a)

Describe the principles of public key cryptography. (Unit-III, Topic No. 3.1)

(b)

Explain X.509 directory authentication service. [15] (Unit-III, Topic No. 3.6)

(a)

What is radix-64 format? Explain how both PGP and S/MIME perform the radix-64 conversion.

(Unit-IV, Topic No. 4.2)

5.

6.

7.

8.

(b)

Describe the five principal services that Pretty Good Privacy (PGP) provides. [15] (Unit-IV, Topic No. 4.1)

(a)

Explain the tunnel mode ESP in IPSec. (Unit-V, Topic No. 5.4)

(b)

What are the applications of IPSec? [15] (Unit-V, Topic No. 5.1)

(a)

List and explain the SET requirement. (Unit-VI, Topic No. 6.3)

(b)

Explain the operations of SSL record protocol. [15] (Unit-VI, Topic No. 6.2)

(a)

Compare and contrast between SNMP version 1 and SNMP version 3. (Unit-VII, Topic No. 7.2)

(b)

What are the typical phases of operation of a virus? [15] (Unit-VII, Topic No. 7.4)

(a)

Explain the various approaches to intrusion detection. (Unit-VII, Topic No. 7.3)

(b)

Explain the principles and limitations of a firewall. [15] (Unit-VIII, Topic No. 8.1)

B.Tech. III-Year II-Sem.

( JNTU-Hyderabad )

Spectrum ALL-IN-ONE Journal for Engineering Students, 2013

S.2

SOLUTIONS TO APRIL/MAY-2012, SET-1, QP


Q1.

(a)

Discuss about the internet standards.


April/May-12, Set-1, Q1(a)

Answer :
For answer refer Unit-I, Q12.
(b)

Explain the various types of security attacks.


April/May-12, Set-1, Q1(b)

Answer :
For answer refer Unit-I, Q1.
Q2.

(a)

Briefly explain block cipher modes of operation.


April/May-12, Set-1, Q2(a)

Answer :
For answer refer Unit-II, Q23.
(b)

Explain the location of encryption devices.


April/May-12, Set-1, Q2(b)

Answer :
For answer refer Unit-II, Q26.
Q3.

(a)

Describe the principles of public key cryptography.


April/May-12, Set-1, Q3(a)

Answer :
For answer refer Unit-III, Q1.
(b)

Explain X.509 directory authentication service.


April/May-12, Set-1, Q3(b)

Answer :
For answer refer Unit-III, Q30.
Q4.

(a)

What is radix-64 format? Explain how both PGP and S/MIME perform the radix-64 conversion.

Answer :

April/May-12, Set-1, Q4(a)

For answer refer Unit-IV, Q22.


(b)

Describe the five principal services that Pretty Good Privacy (PGP) provides.
April/May-12, Set-1, Q4(b)

Answer :
For answer refer Unit-IV, Q1.
Q5.

(a)

Explain the tunnel mode ESP in IPSec.


April/May-12, Set-1, Q5(a)

Answer :
For answer refer Unit-V, Q3.
(b)

What are the applications of IPSec?

Answer :

April/May-12, Set-1, Q5(b)

For answer refer Unit-V, Q18, Topic: Tunnel Mode ESP.

B.Tech. III-Year II-Sem.

( JNTU-Hyderabad )

Network Security (April/May-2012, Set-1) JNTU-Hyderabad


Q6.

(a)

S.3

List and explain the SET requirement.


April/May-12, Set-1, Q6(a)

Answer :
For answer refer Unit-VI, Q24, (Paragraphs 1 and 2 only).
(b)

Explain the operations of SSL record protocol.


April/May-12, Set-1, Q6(b)

Answer :
For answer refer Unit-VI, Q7.
Q7.

(a)

Compare and contrast between SNMP version 1 and SNMP version 3.


April/May-12, Set-1, Q7(a)

Answer :
SNMPv1
1.

It is the initial version of SNMP protocol defined

SNMPv3
1.

in RFCs 1155 and 1157.


2.

Its framework provides the notion of authentication

It is the newest version of SNMP defined in RFCs


1905, 1906, 3411, 3412, 3414, and 3415.

2.

service that supports authentication techniques.

Its framework provides the notion of elaborating the


authentication service to provide other services
like privacy.

3.

Its framework provides the access control based

3.

in SNMP MIB view.


4.

SNMPv1, provides security facility, based on

control which is known as view-based access control.


4.

community conception.
5.

Community strings are used to authenticate

The agent uses the community string, to decide


whether to process or discard the packet, which

SNMPv3 includes security and remote configuration


capabilities to the previous versions.

5.

the packets.
6.

Its framework provides a concept similar to access

Community strings are not used in SNMPv3 instead,


users with passwords are used.

6.

Depending on how the users have been defined, the


packets in SNMPv3 are authenticated and encrypted.

is sent in plain text in each and every SNMPv1 packet.


(b)

What are the typical phases of operation of a virus?


April/May-12, Set-1, Q7(b)

Answer :
For answer refer Unit-VII, Q34, Topic: Life Cycle of Virus.
Q8.

(a)

Explain the various approaches to intrusion detection.


April/May-12, Set-1, Q8(a)

Answer :
For answer refer Unit-VII, Q24.
(b)

Explain the principles and limitations of a firewall.

Answer :

April/May-12, Set-1, Q8(b)

For answer refer Unit-VIII, Q3.

B.Tech. III-Year II-Sem.

( JNTU-Hyderabad )