Professional Documents
Culture Documents
)
Information Assurance & Network Security
P. Pages : 2 TKN/KS/16/7597
Time : Three Hours *0960* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.
rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.
.O
7. Solve Question 11 OR Questions No. 12.
8. Assume suitable data whenever necessary.
9. Illustrate your answers wherever necessary with the help of neat sketches.
ts
1. a) Explain the terminology security and attacks. Also discuss various security goals. 7
n OR
de
2. a) Explain various modes of ciphers. 8
3. a) What is meant by symmetric key encryption ? "It provides least level of security and it 4
has no meaning in using" - Do you agree with the statement justify your answer.
S
OR
OR
TKN/KS/16/7597 1 P.T.O
6. a) Explain Kerberos 5.0 architecture. 7
b) Explain the importance of key generation distribution updation and digital certificate 6
relevant to the network security.
rg
i) Anomaly based ii) Signature based
iii) Host based iv) Network based systems
OR
.O
8. a) Discuss IP security architecture in detail. 8
ts
9. a) Explain various situations involved in password management. 6
OR
10. a) Differentiate between worms and viruses. Also explain lifecycle of worms. 6
tu
11. a) "Computer engineer must have knowledge about computer Forensics"- Comment on the 6
S
statement.
ur
b) Cyber terrorism is a serious issue now a days developed countries are facing. Do you think 7
that our country will also face the similar kind of problems in near future. Discuss the
scenario.
gp
OR
12. a) Discuss various online investigation tools. Also explain How they are useful in tracking 7
and recovering electronic evidences.
Na
**********
TKN/KS/16/7597 2