You are on page 1of 2

Total No. of Questions : 10] SEAT No.

8
23
P3985 [5561]-689
[Total No. of Pages : 2

ic-
B.E. (Computer Engineering)

tat
7s
INFORMATION AND CYBER SECURITY

1:2
(2015 Pattern) (Semester - II) (410251)

01 91
3:4
0
Time : 2½ Hours] [Max. Marks : 70

91
2/0 13
Instructions to the candidates:
1) All questions are compulsory.
0
5/2
.23 GP

2) Figures to the right side indicate full marks.


E
82

8
C

23
ic-
16

Q1) a) List and explain various elements of Information security. [5]

tat
8.2

7s
b) Using Hill Cipher encrypt the message ‘ESSENTIAL’. The key for
.24

1:2
encryption is ‘ANOTHERBZ’. [5]
91
49

3:4
OR
30
91

Q2) a) What is steganography? What are the applications and limitations of


01
01

steganography? [5]
5/2
GP

b) Use Transposition Cipher to encrypt plain text ‘I Love my India’ and


2/0

use the key ‘HEAVEN’. [5]


CE
82

8
[Use single columnar transposition]

23
.23

ic-
16

tat
Q3) a) Discuss elliptic curve cryptography in detail. [5]
8.2

7s

b) What is block Cipher? Explain counter mode of block Cipher. [5]


.24

1:2
91

OR
49

3:4
30

Q4) a) What is authentication? Explain various methods authentication. [5]


91
01

b) Explain working of AES in detail. [5]


01
5/2
GP
2/0

Q5) a) Discuss the working of IPSec. What are the benefits of IPSec. [6]
CE
82

b) What is VPN? Explain types of VPN. [6]


.23

c) Compare PGP, MIME and S/MIME. [6]


16

OR
8.2
.24

1 P.T.O.
49

[5561]-689
Q6) a) Differentiate between IP-V4 and IP-V6. [4]

8
23
b) Explain secure socket layer handshake protocol in detail. [7]

ic-
c) Explain ISAKMP protocol of IPSec with header format. [7]

tat
7s
1:2
Q7) a) What are the various types of firewall. Discuss limitations of firewall.[8]

01 91
3:4
b) Explain any two password management practices. [4]

0
91
c) What is trusted system.
2/0 13 [4]
OR
0
5/2
Q8) a) Explain need and challenges of intrusion detection system. Define signature
.23 GP

based IDS. [8]


E

b) What is access control security services. [4]


82

8
C

23
c) Explain packet filtering firewall. [4]

ic-
16

tat
8.2

7s
.24

Q9) a) Explain personally identifiable information PII. Describe PII impact levels
1:2
91
with examples. [8]
49

3:4
b) What is cyber stalking? How to identify and detect cyber stalking. [8]
30
91

OR
01
01

Q10)a) What are different phases of cyber forensics? Explain with suitable
5/2
GP

diagram. [8]
2/0

b) Discuss PII confidentiality safeguards. [8]


CE
82

8
23
.23

ic-
16

tat

8.2

7s
.24

1:2
91
49

3:4
30
91
01
01
5/2
GP
2/0
CE
82
.23
16
8.2
.24

2
49

[5561]-689

You might also like