You are on page 1of 1

C9

C5

0B

B0
D
Paper / Subject Code: 32422 / Computer Network Security

AA
1A
D3

5D

9F
0B
CA

AD

AC
3C

FB
5D
1E

AD

DA
B1

C9
3C
4F

0
C

AA
1A
D
1E

D
9F
Time (3 Hours) [Total Marks 80]

C5

0B
CA

AD
FC

3
F4

D
E

AD

B1
31

C5
N. B:

F1

D
C
39

0
C

1A
3
F4
F

D
1. Question No. 1 is Compulsory.

1E

AD
02

C5
C9

0B
3
FB
2. Solve any THREE from Question No. 2 to 6.

4F
39

EC

D3
F

5D
9F
2
C9

31
3. Draw neat well labelled diagram wherever necessary

B0

F1

CA

3C
FC
9
AA

4
23
9F

AD
9F
1
0

F1
AD

93
Q. 1 a) A secure e-voting system is to be designed. Discuss the security goals that must met and

C
B

C
A

3
4
23
F

F
DA
B1

1E

AD
9F
enlist mechanisms for the same. (5)

31
B0
AC

4F
0

39
1A

EC
b) Explain principle elements of NAC (5)
5D

9F

1F
DA

9F
02
B

F1
C

93
c) Enlist properties & applications of Hash function. (5)
C

FB

FC
D0

A
1A
D3

F4
3
d) Describe different types of Denial of service attacks. (5)

DA

02
9

1
5

0B
CA

C9
C

93
C

F
A
A
D3

F4
23
F

F
1E

DA
1

31
C5

B
CA

Q2. a) Explain the need of Network Access Control in Enterprise Networks. Explain the major NAC

B0

C9
AC
4F

D0

39
A
D3

9F

1F
enforcement methods. (10)
1E
F

DA
B1

02
C5
C9

CA

AC

93
4F

FB
b) Explain in detail with diagram, How Kerberos can be used for authentication. (10)

D0

1A
D3
1F

23
E
F

DA

C9
C5
C9

0B
93

B0
4F

EC

AA
A
3
23

1F

9F
D
F

1
C5
B0

C9

F1

0B
93

CA

AD

AC
Q3. a) How is security achieved in the transport and tunnel modes of IPSEC? Describe the role of
3
4
23
9F

1F

D
E

AD
9F

DA
B1
AH and ESP. (10)

C5
B0

F1
AC

93

FC

D0
EC

1A
D3
F4

b) Define Malware. Explain its types in detail (10)


23
9F
DA

C5
B0

C9

F1
AC

0B
93

A
1A

EC

3
F4
23
9F

1F

5D
DA

AD
Q4. a) Explain Firewall & its types along with advantages and disadvantages (10)
0B

B0

F1
AC

93

3C
FC
1A

EC
b) Explain different modes of operation of Block ciphers (10)
5D

4
3
9F
DA

AD
9F
02

1
0B

F1
AC

93
3C

FB

C
1A

EC
5D

F4
23

1F
AD

DA

Q5. a) Explain classical encryption techniques with example (10)


9
0B

B0

C9

F1
C

93
C
EC

b) In an RSA system, given N=91 e=5 Calculate Φ(n),p, q and private key d. What is the cipher
AA
1A
D3

5D

F4
23
9F

1F
F1

0B
CA

text when you encrypt message m=25 using the public key. Also perform decryption. (10)
0

C9
AD

93
3C

FB
AA
F4

5D

1F
1E

AD

B1

02
C9
C9

AD

93
3C
4F

Q6. Write Short Notes on ANY 4: (20)


0
C

A
5D

23
9F
1E

AD
9F

DA
1

a) SSL protocol stack


B

B0
C
3C
C

4F

0
C

AA
1A
1F

5D

b) Compare and contrast AES and DES


9F
1E

AD
9F

0B
3

AD

AC
3C
C

4F

c) IDS and its types


39

C
1F

5D
1E

AD
9F
2

DA
B1

d) Use cases for NAC


B0

3C
C

4F
39

D0
C

1A

e) Digital Signature
1F

1E

D
9F
2

C5
B0

0B
3

A
C

4F
39

D3
9F

1F

5D
1E
9F
2
B0
AC

3C
C

4F
39

EC
F

1F
DA

AD
9F
2
C9

B0

F1
3

C
39
AA

EC
F4
F

1F

**********
2
C9

B0

F1
D

C
39
AA
1A

F4
F

1F
2
C9
0B

B0

C9
D

3
39
AA
1A
D

1F
2
C9
C5

0B

B0
D

93
AA
1A
5D

23
F
C9
0B

B0
D
3C

AA
1A
5D

F
AD

C9
0B

D
3C
EC

AA
1A
5D
D

11948
F1

0B
CA

D
3C

1A
5D
1E

0B
CA

FC9F4F1ECAD3C5D0B1ADAAC9FB023931
3C
4F

You might also like