You are on page 1of 1
WO UN Universes“ oarpodha . 7° By i Subject; Information Technology Paper: Data & Nei ork Si y (IT: 4549, Time Allowed; 2:30 Hours Maximum Marks: 80 Note: Objective Part is compulsory. AttemP! #"Y four questions from subjective Part. - ce Pa Objective Part (Computsory) 4. Write short answers of the following in 2-3 Tines ea 8 1 What is the importance of security Policy? ch on thé answer sheeb (2"16) What is chosen-plaintext attack? @ iii, Define Security Association. “iv. What is the role of Kerberos in network Seuiy? fy. Write the function of Handshake protocol? ' vi, Define'trust? Tyii, ‘The strength ofvigencre cipher lies on which factor? _.viii, Define transposition technique? _~ ix. Define router security? 5 nx. Wh Avalanche effect is desirable property in any e1 ‘ an a Whauis the drawback of tiple DES? Seven ean — xii, Which factors affect the size of initialization vector? _— xiii. Define timing attacks. xiv. When Symmetric-key cryptography is more efficient than asymmemc-key cryptography? _—xv. _ Whatis bash function? _-xvi. How AAA ensures security? Subjective Part (4912) How AES ensures security? } Explain encryption and decryption with Playfair in detail? Explain Diffie-Hellman key exchange technique with example? How certificate authority solves the problem of management of public keys? What is a WLAN? How Wireless Works swith and without open ports? What is message authentication? Explait authentication functions. tShahab.blogspot.com

You might also like