Professional Documents
Culture Documents
8
-23
P613 [Total No. of Pages : 2
tic
sta
BE/Insem/APR - 246
:05
B.E. (Computer Engineering)
91
:27
INFORMATION AND CYBER SECURITY
13
30
(2015 Pattern) (Semester - II)
19
01
Time : 1 Hour] /20 [Max. Marks : 30
.23 GP
/03
8
2) Neat diagrams must be drawn wherever necessary.
23
3) Figures to the right indicate full marks.
ic-
16
tat
8.2
5s
.24
7:0
91
Q1) a) Explain Operational Security Model for Network Security. [5]
49
3:2
30
b) How Information Security attacks are classified? Give example for each.
91
[5]
01
01
3/2
GP
OR
2/0
8
-23
.23
sta
8.2
i) ECB
2/0 13
ii) OFB
8 1 P0
3/2
OR
G
P.T.O.
49
Q5) a) Find the key exchanged between Alok and Bobby considering following
8
data.
-23
i) n = 11
tic
sta
ii) g=5
:05
iii) X = 2, Y = 3
91
:27
Find value of A, B and secret key K. [5]
13
30
b) What is Kerberos? Explain operation in detail. [5]
19
01
/20 OR
.23 GP
/03
8
23
ic-
b) Explain in details the need & implementation of one way hash function
16
tat
(MD5). [5]
8.2
5s
.24
7:0
91
ïïï
49
3:2
30
91
01
01
3/2
GP
2/0
CE
81
8
-23
.23
tic
16
sta
8.2
:05
.24
01 91
:27
49
13
0
2/0 13
9
8 1 P0
3/2
G
CE
.23
16
8.2
.24
BE/Insem/APR - 246 2
49