You are on page 1of 2

B.E. (Computer Engineering) Seventh Semester (C.B.S.

)
Information Assurance & Network Security

P. Pages : 2 TKN/KS/16/7597
Time : Three Hours *0960* Max. Marks : 80
_____________________________________________________________________
Notes : 1. All questions carry marks as indicated.
2. Solve Question 1 OR Questions No. 2.

rg
3. Solve Question 3 OR Questions No. 4.
4. Solve Question 5 OR Questions No. 6.
5. Solve Question 7 OR Questions No. 8.
6. Solve Question 9 OR Questions No. 10.

.O
7. Solve Question 11 OR Questions No. 12.
8. Assume suitable data whenever necessary.
9. Illustrate your answers wherever necessary with the help of neat sketches.

ts
1. a) Explain the terminology security and attacks. Also discuss various security goals. 7

b) Discuss secret splitting and sharing. 6

n OR
de
2. a) Explain various modes of ciphers. 8

b) Write short notes on: 5


i) Discrete logarithm
tu

ii) Substitution and transposition

3. a) What is meant by symmetric key encryption ? "It provides least level of security and it 4
has no meaning in using" - Do you agree with the statement justify your answer.
S

b) Explain SHA-1 algorithm. 6


ur

c) Write short note on: 4


i) Linear cryptanalysis
ii) Differential cryptanalysis.
gp

OR

4. a) Discuss RSA algorithm. 4


Na

b) Explain MD 5 algorithm in detail. 7

c) Explain S-Boxes in DES. 3

5. a) Explain digital signature standard. 6

b) Write Diff-Hellman algorithm. 7

OR

TKN/KS/16/7597 1 P.T.O
6. a) Explain Kerberos 5.0 architecture. 7

b) Explain the importance of key generation distribution updation and digital certificate 6
relevant to the network security.

7. a) Explain tunnel mode and transport mode in brief. 6

b) Write short notes on : 8


Intrusion detection systems.

rg
i) Anomaly based ii) Signature based
iii) Host based iv) Network based systems

OR

.O
8. a) Discuss IP security architecture in detail. 8

b) Explain SSL handshake protocol. 6

ts
9. a) Explain various situations involved in password management. 6

b) Write notes on:


i) Mobile payments.
ii) Smart cards.
n 3
2
de
iii) Cheap card transactions. 2

OR

10. a) Differentiate between worms and viruses. Also explain lifecycle of worms. 6
tu

b) Explain various types of firewall designs (any two). 7

11. a) "Computer engineer must have knowledge about computer Forensics"- Comment on the 6
S

statement.
ur

b) Cyber terrorism is a serious issue now a days developed countries are facing. Do you think 7
that our country will also face the similar kind of problems in near future. Discuss the
scenario.
gp

OR

12. a) Discuss various online investigation tools. Also explain How they are useful in tracking 7
and recovering electronic evidences.
Na

b) Explain internet fraud and cyber stacking. 6

**********

TKN/KS/16/7597 2

You might also like