This document contains a practice test for an Information Security class. The test has 4 questions with subparts related to networking security models, cryptographic attacks, encryption algorithms like Playfair cipher, DES, AES, and encryption modes. Students are asked to explain concepts, solve encryption problems, compare symmetric and asymmetric encryption, and describe algorithms and their working in 3 sentences or less for each subquestion. The test aims to evaluate students' understanding of key topics covered in the Information Security unit. It is worth 30 marks and must be completed within 1 hour.
This document contains a practice test for an Information Security class. The test has 4 questions with subparts related to networking security models, cryptographic attacks, encryption algorithms like Playfair cipher, DES, AES, and encryption modes. Students are asked to explain concepts, solve encryption problems, compare symmetric and asymmetric encryption, and describe algorithms and their working in 3 sentences or less for each subquestion. The test aims to evaluate students' understanding of key topics covered in the Information Security unit. It is worth 30 marks and must be completed within 1 hour.
This document contains a practice test for an Information Security class. The test has 4 questions with subparts related to networking security models, cryptographic attacks, encryption algorithms like Playfair cipher, DES, AES, and encryption modes. Students are asked to explain concepts, solve encryption problems, compare symmetric and asymmetric encryption, and describe algorithms and their working in 3 sentences or less for each subquestion. The test aims to evaluate students' understanding of key topics covered in the Information Security unit. It is worth 30 marks and must be completed within 1 hour.
Department Of Computer Engineering In Sem Pratice Test Class: TE Computer (Div - A) AY:2023-24 Subject: Information Security
Marks: 30] Time: 1 Hr Date: 8/02/24
Ques. UNIT I Marks No. Q. 1 a) Explain OSI Security Architecture with diagram 6 b) Explain various types of cryptanalytic attacks and brute- 5 force attack c) Discuss network security model. 4 OR Q 2. a) Classify security attacks and briefly explain each attack. 6 b) Define Security. Explain CIA Triad. 5 c) Explain Security services. 4 UNIT II Q 3. a) Expain playfair cipfer rules and solve encrypt 6 “HELLOWORLD” using key as “SECURITY”. b) Explain DES algorithm in detail. 5 c) Compare between Symmetric and Asymmetric 4 encryption. OR Q 4. a) Explain Hill Cipher and use hill cipher to encipher 6 “ATTACK AT DOWN” using key “CEFJCBDRH”. b) Explain Working of AES. 5 c) Describe block cipher modes of operation. 4