Professional Documents
Culture Documents
8
23
P3985 [5561]-689
[Total No. of Pages : 2
ic-
B.E. (Computer Engineering)
tat
7s
INFORMATION AND CYBER SECURITY
1:2
(2015 Pattern) (Semester - II) (410251)
01 91
3:4
0
Time : 2½ Hours] [Max. Marks : 70
91
2/0 13
Instructions to the candidates:
1) All questions are compulsory.
0
5/2
.23 GP
8
C
23
ic-
16
tat
8.2
7s
b) Using Hill Cipher encrypt the message ‘ESSENTIAL’. The key for
.24
1:2
encryption is ‘ANOTHERBZ’. [5]
91
49
3:4
OR
30
91
steganography? [5]
5/2
GP
8
[Use single columnar transposition]
23
.23
ic-
16
tat
Q3) a) Discuss elliptic curve cryptography in detail. [5]
8.2
7s
1:2
91
OR
49
3:4
30
Q5) a) Discuss the working of IPSec. What are the benefits of IPSec. [6]
CE
82
OR
8.2
.24
1 P.T.O.
49
[5561]-689
Q6) a) Differentiate between IP-V4 and IP-V6. [4]
8
23
b) Explain secure socket layer handshake protocol in detail. [7]
ic-
c) Explain ISAKMP protocol of IPSec with header format. [7]
tat
7s
1:2
Q7) a) What are the various types of firewall. Discuss limitations of firewall.[8]
01 91
3:4
b) Explain any two password management practices. [4]
0
91
c) What is trusted system.
2/0 13 [4]
OR
0
5/2
Q8) a) Explain need and challenges of intrusion detection system. Define signature
.23 GP
8
C
23
c) Explain packet filtering firewall. [4]
ic-
16
tat
8.2
7s
.24
Q9) a) Explain personally identifiable information PII. Describe PII impact levels
1:2
91
with examples. [8]
49
3:4
b) What is cyber stalking? How to identify and detect cyber stalking. [8]
30
91
OR
01
01
Q10)a) What are different phases of cyber forensics? Explain with suitable
5/2
GP
diagram. [8]
2/0
8
23
.23
ic-
16
tat
8.2
7s
.24
1:2
91
49
3:4
30
91
01
01
5/2
GP
2/0
CE
82
.23
16
8.2
.24
2
49
[5561]-689