You are on page 1of 4
Code : 061505 B.Tech Sth Semester Exam., 2018 INFORMATION SECURITY Time : 3 hours Frill Marks : 70 Instructions (9 The marks are indicated in the righthand margin Ai) There are NINE questions inthis paper. (i) Atempt FIVE questions in all. (u) Question Mo, 1 is compulsory 1. Choose the correct alternative (any seven) 27-14 ‘An encryption algorithm transforms ig plaintext into (cipher text 60 simple text (8) plaintext (iv) empty text itpnwwe seus E4260 (Tum Over (2) (b) From a bank's perspective, which is usually more important? CA The integrity ofits customer's data, (i) The confidentiality of the data (ii) Depends upon customer's choice {iy} None of the above fo) Which one in not belongs to passive attack? * ® 3o—Tralfic analysis tip Interception SeFateruption (2) Snooping (a) DES follows Hash algorithm: (i) Caesars cipher 0) Feistel cipher structure (io) SP networks (e) te. asymmetric encryption x) same ey is used for encryption and decryption ‘AK9/160 Continued ) (3) ip itecent_ ey, ae used °° enceyption and decryption no key is required for encryption and decryption None of the above | ) oy which of the following does © Nathentiation ain to accomplish? Restrict what operations/data the (@) Determine ifthe user is an attacker (ii) Flag the user ifhe/she misbehaves "GiF Determine who the user is | (a) Which happens first-authorization or | authentication? l-Authorization ‘authentication fii) Both are same | fio) None of the above (hy What is the purpose of a denial of | service attack? (@ Exploit a weakness in the TCP/IP stack AK9/160 (Tum Over ) (4) (5) {i To execute 2 Trojan on a eystem What do you mean by information FO weary? Explain with characteristics. 6 (i) To overload a°system so it is no . longer operational (0) Write short notes on cryptographer, A979 stn ers ty ci inode, them off cxyptonraphy. aphy (7 Which ofthe folowing is software that 3, (a) Elaborate the concept of project enace installed on your computer, tacks \VENONA with all features. 8 your Internet browsing ‘habits and . Sends you popups containing (b) Bnceypt the message ‘attackxatxdawa advertisements related to the sites and using a double transposition cipher topics you have visited? with + rows and 4 columns, using the _ Jafow permutation 0,234) 2,413) PAP Backsoors ~~ - oe the column permutation fi) Adware 62.3.48129) ° (68) Malware 4. (a) Write with explanation, the important Spyware 6) Spy design considerations for a stream cipher. 7 @Comrunication in client server systems (0). Dilfecentate the Feistel and non ilferentiate the Feistel and non-Feistel may use Sockets and ay design architecture with all (Process Control Block (PCB) characteristics, 7 (i) Remote Procedure Calls (RPC3) (ii) Kernel Mode 5. (a) How is block cipher different from stream cipher? State all features to io) Registers satialy this 5 AK9/160 {Continued } AK9/160 (Tum Over }

You might also like