Professional Documents
Culture Documents
No
Outcomes
Levels of
Course
B.T
Time slot : 09.15 To 10.45 am/pm Marks : 50
PART – A Answer All Questions (6 x 2 = 12 Marks)
1. State the requirements of digital signatures. LOTS 4
3. State the protocol which suppresses the replay attacks and at the same time fix the problem of HOTS 4
Needham/Schroeder protocol.
4. What do you mean by Bastion Host? LOTS 5
5. Identify the security parameters that may be applicable when analyzing e-mail security HOTS 5
8. Describe how PGP provides confidentiality and authentication services for email application LOTS 5
10. (a) (i) Explain the phases of SSL handshake protocol for 7 LOTS 5
a. Establishing security capabilities
b. Server authentication and key exchange
c. Client authentication and key exchange
(ii) A device with 192.168.1.147 tries to connect to a device with IP 7 HOTS 5
(192.0.9.40) ,then the connection is first verified by firewall that completes the
TCP three way handshaking process and if there is a consequent traffic arises
then how it will be detected using packet filtering method?
(OR)
(b) (i) Explain the functions of S/MIME 7 LOTS 5
(ii) Apply the Statistical Anomaly method for legitimate user where statistical tests are 7 HOTS 5
applied to observed behavior with a high level of confidence.
Bloom’s LOTS HOTS To
Percentage 50 50 1