This document is an exam for a networking security course, with two parts testing objective and descriptive questions. Part A contains 4 multiple choice or short answer questions worth 1 mark each on the topics of RADIUS, WEP keys, 2G technology drawbacks, and phishing. Part B requires answering 3 of 4 longer questions worth 4 marks each, covering data protection in TKIP, authentication and key agreement in 3G, ARP spoofing, and explaining the GSM network architecture.
This document is an exam for a networking security course, with two parts testing objective and descriptive questions. Part A contains 4 multiple choice or short answer questions worth 1 mark each on the topics of RADIUS, WEP keys, 2G technology drawbacks, and phishing. Part B requires answering 3 of 4 longer questions worth 4 marks each, covering data protection in TKIP, authentication and key agreement in 3G, ARP spoofing, and explaining the GSM network architecture.
This document is an exam for a networking security course, with two parts testing objective and descriptive questions. Part A contains 4 multiple choice or short answer questions worth 1 mark each on the topics of RADIUS, WEP keys, 2G technology drawbacks, and phishing. Part B requires answering 3 of 4 longer questions worth 4 marks each, covering data protection in TKIP, authentication and key agreement in 3G, ARP spoofing, and explaining the GSM network architecture.
Code No: 5R211 M. TECH. IYear IISemester I InternalExaminations APPLICATIONS OF NETWORK SECURITY (CNIS) Time: 2 Hours Max. Marks: 16
Note: No additional answer sheets will be provided.
Part - A (Objective Type) Max.Marks:4 ANSWER ALL QUESTIONS. EACH QUESTION CARRIES 2&3 MARK.
1. What is the full form of RADIUS? (1M)
2. List out any 3 keys used in WEP? (1M) 3. Drawbacks of 2G Technology? (1M) 4. What is Phishing? (1M) Part B Max. Marks: 12 ANSWER ANY THREE QUESTIONS. EACH QUESTION CARRIES 4 MARKS.
1. Describe the Data protection in TKIP.
2. Explain about authentication and Key agreement in UMTS (3G). 3. Describe ARP Spoofing. 4. Draw the architecture of GSM and explain each entity.