You are on page 1of 4

Code No: R05411202 R05 Set No.

2
IV B.Tech I Semester Examinations,December 2011
INFORMATION SECURITY
Common to Information Technology, Computer Science And Systems
Engineering
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) “Gaining control over the Routing tables at layer 3 is one of the attacks” -
explain how Route tables modification is crucial.
(b) Explain how Buffer overflow is created for any known platforms (eg., WIN-
DOWS NT / LINUX). [8+8]
2. (a) “A bastion host is a critical strong point in the network’s security”. Justify?
(b) Discuss in detail profile-based anomaly detection. [8+8]
3. (a) Explain the Feistel cipher structure.
(b) With a clear diagram explain how Cipher Block Chaining mode is performed.
[8+8]
4. Write about the following terms related to PGP and S/MIME:
(a) Radix-64
(b) Session key
(c) Compression
(d) Encryption
(e) Decryption. [16]
5. (a) Discuss the two ways in which the IPSec authentication service can be used.
(b) List any eight ISAKMP payload types and describe them. [8+8]
6. (a) Explain the relationship between Digital signature and Certification authority.
(b) Clearly explain the following corresponding to X.509 authentication service:
i. One-way authentication
ii. Two-way authentication
iii. Three-way authentication. [8+8]
7. (a) What are the two cryptographic functions defined for USM? Explain.
(b) Explain advanced antivirus techniques in detail. [6+10]
8. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing,
IP hijacking and brute-force attacks to web security. [16]

?????

1
Code No: R05411202 R05 Set No. 4
IV B.Tech I Semester Examinations,December 2011
INFORMATION SECURITY
Common to Information Technology, Computer Science And Systems
Engineering
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) Discuss the two ways in which the IPSec authentication service can be used.
(b) List any eight ISAKMP payload types and describe them. [8+8]
2. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing,
IP hijacking and brute-force attacks to web security. [16]
3. (a) Explain the Feistel cipher structure.
(b) With a clear diagram explain how Cipher Block Chaining mode is performed.
[8+8]
4. (a) “A bastion host is a critical strong point in the network’s security”. Justify?
(b) Discuss in detail profile-based anomaly detection. [8+8]
5. Write about the following terms related to PGP and S/MIME:
(a) Radix-64
(b) Session key
(c) Compression
(d) Encryption
(e) Decryption. [16]
6. (a) “Gaining control over the Routing tables at layer 3 is one of the attacks” -
explain how Route tables modification is crucial.
(b) Explain how Buffer overflow is created for any known platforms (eg., WIN-
DOWS NT / LINUX). [8+8]
7. (a) Explain the relationship between Digital signature and Certification authority.
(b) Clearly explain the following corresponding to X.509 authentication service:
i. One-way authentication
ii. Two-way authentication
iii. Three-way authentication. [8+8]
8. (a) What are the two cryptographic functions defined for USM? Explain.
(b) Explain advanced antivirus techniques in detail. [6+10]

?????

2
Code No: R05411202 R05 Set No. 1
IV B.Tech I Semester Examinations,December 2011
INFORMATION SECURITY
Common to Information Technology, Computer Science And Systems
Engineering
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. Write about the following terms related to PGP and S/MIME:


(a) Radix-64
(b) Session key
(c) Compression
(d) Encryption
(e) Decryption. [16]
2. (a) Discuss the two ways in which the IPSec authentication service can be used.
(b) List any eight ISAKMP payload types and describe them. [8+8]
3. (a) Explain the relationship between Digital signature and Certification authority.
(b) Clearly explain the following corresponding to X.509 authentication service:
i. One-way authentication
ii. Two-way authentication
iii. Three-way authentication. [8+8]
4. (a) Explain the Feistel cipher structure.
(b) With a clear diagram explain how Cipher Block Chaining mode is performed.
[8+8]
5. (a) What are the two cryptographic functions defined for USM? Explain.
(b) Explain advanced antivirus techniques in detail. [6+10]
6. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing,
IP hijacking and brute-force attacks to web security. [16]
7. (a) “Gaining control over the Routing tables at layer 3 is one of the attacks” -
explain how Route tables modification is crucial.
(b) Explain how Buffer overflow is created for any known platforms (eg., WIN-
DOWS NT / LINUX). [8+8]
8. (a) “A bastion host is a critical strong point in the network’s security”. Justify?
(b) Discuss in detail profile-based anomaly detection. [8+8]

?????

3
Code No: R05411202 R05 Set No. 3
IV B.Tech I Semester Examinations,December 2011
INFORMATION SECURITY
Common to Information Technology, Computer Science And Systems
Engineering
Time: 3 hours Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
?????

1. (a) Explain the relationship between Digital signature and Certification authority.
(b) Clearly explain the following corresponding to X.509 authentication service:
i. One-way authentication
ii. Two-way authentication
iii. Three-way authentication. [8+8]
2. (a) “Gaining control over the Routing tables at layer 3 is one of the attacks” -
explain how Route tables modification is crucial.
(b) Explain how Buffer overflow is created for any known platforms (eg., WIN-
DOWS NT / LINUX). [8+8]
3. (a) Explain the Feistel cipher structure.
(b) With a clear diagram explain how Cipher Block Chaining mode is performed.
[8+8]
4. (a) What are the two cryptographic functions defined for USM? Explain.
(b) Explain advanced antivirus techniques in detail. [6+10]
5. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing,
IP hijacking and brute-force attacks to web security. [16]
6. (a) Discuss the two ways in which the IPSec authentication service can be used.
(b) List any eight ISAKMP payload types and describe them. [8+8]
7. Write about the following terms related to PGP and S/MIME:
(a) Radix-64
(b) Session key
(c) Compression
(d) Encryption
(e) Decryption. [16]
8. (a) “A bastion host is a critical strong point in the network’s security”. Justify?
(b) Discuss in detail profile-based anomaly detection. [8+8]

?????

You might also like