WO UN
Universes“ oarpodha .
7° By i
Subject; Information Technology Paper: Data & Nei
ork Si y (IT: 4549,
Time Allowed; 2:30 Hours
Maximum Marks: 80
Note: Objective Part is compulsory. AttemP! #"Y four questions from subjective Part.
- ce Pa
Objective Part (Computsory)
4. Write short answers of the following in 2-3 Tines ea
8 1 What is the importance of security Policy? ch on thé answer sheeb (2"16)
What is chosen-plaintext attack?
@ iii, Define Security Association.
“iv. What is the role of Kerberos in network Seuiy?
fy. Write the function of Handshake protocol? '
vi, Define'trust?
Tyii, ‘The strength ofvigencre cipher lies on which factor?
_.viii, Define transposition technique?
_~ ix. Define router security? 5
nx. Wh Avalanche effect is desirable property in any e1 ‘ an
a Whauis the drawback of tiple DES? Seven ean
— xii, Which factors affect the size of initialization vector?
_— xiii. Define timing attacks.
xiv. When Symmetric-key cryptography is more efficient than asymmemc-key
cryptography?
_—xv. _ Whatis bash function?
_-xvi. How AAA ensures security?
Subjective Part (4912)
How AES ensures security? }
Explain encryption and decryption with Playfair in detail?
Explain Diffie-Hellman key exchange technique with example?
How certificate authority solves the problem of management of public keys?
What is a WLAN? How Wireless Works swith and without open ports?
What is message authentication? Explait authentication functions.
tShahab.blogspot.com