This document contains an examination for a Web and Network Security course with 6 multiple choice questions covering related topics. The questions assess understanding of concepts like viruses vs worms; web security threats; cryptanalysis; masqueraders vs intruders; IP security; digital signatures; SSL, SET, and S/MIME; firewalls; cryptography; and hashing algorithms like MD5. Students must choose options to answer sub-questions that explore applications of technologies like digital signatures, public key cryptography, cryptographic hash functions, IPsec, and secure protocols. Explanations of concepts like Trojan horses, keyloggers, PGP authentication and formats, and hashing standards are also required.
This document contains an examination for a Web and Network Security course with 6 multiple choice questions covering related topics. The questions assess understanding of concepts like viruses vs worms; web security threats; cryptanalysis; masqueraders vs intruders; IP security; digital signatures; SSL, SET, and S/MIME; firewalls; cryptography; and hashing algorithms like MD5. Students must choose options to answer sub-questions that explore applications of technologies like digital signatures, public key cryptography, cryptographic hash functions, IPsec, and secure protocols. Explanations of concepts like Trojan horses, keyloggers, PGP authentication and formats, and hashing standards are also required.
This document contains an examination for a Web and Network Security course with 6 multiple choice questions covering related topics. The questions assess understanding of concepts like viruses vs worms; web security threats; cryptanalysis; masqueraders vs intruders; IP security; digital signatures; SSL, SET, and S/MIME; firewalls; cryptography; and hashing algorithms like MD5. Students must choose options to answer sub-questions that explore applications of technologies like digital signatures, public key cryptography, cryptographic hash functions, IPsec, and secure protocols. Explanations of concepts like Trojan horses, keyloggers, PGP authentication and formats, and hashing standards are also required.
Subject Name: Web and Network Security Sem: 6TH Total Marks: 70 *************************************************************************************************** Q.1 Answer any 7 out of ten (14 marks ) 1. Give Difference between virus and worm. List any four name of Virus 2. What are Web security threats. 3. What is Cryptanalysis? 4. What is Masquerader AND intruder? 5. What is IP security? 6. List out properties of digital signature. 7. Give the full form of: (1) SET (2) PGP (3) S/MIME 8. Which are the domains in 3D secure protocol? 9. What is the need of firewall? 10. Define cryptography AND Cryptanalysis? 11. differences between SSL and SET 12. List out steps of MD-5 hashing
Que:2 Answer the Following Question (14 marks )
(a) Which are the applications of digital signature? 03 OR (a) Draw the diagram for SSL protocol stack 03 (b) Which are the applications of the public key cryptosystem? 03 OR (b) Differentiate MD5 and SHA. 03 (c) Which are the applications of cryptographic hash function? 04 OR (c) Explain Message Digest 5 (MD5) in brief 04 Que:3 Answer the Following Question (14 marks ) (a) Explain IP Sec services. What are the benefits of IP Sec 03 OR (a) Explain packet filtering firewall.03 (b) Explain Trojan Horse and Keylogger.03 OR (b) What are the differences between conventional & digital signature 03 (c) Explain PGP authentication Operation04 OR (c) Explain requirement of public key cryptography.04 Que:4 Answer the Following Question (14 marks ) (a) Define malware and worm AND explain its types 03 OR (a) Explain timing attack in brief. 03 (b) Explain general format of PGP message AND List out PGP services 03 OR (b) Explain Rabin Scheme AND Explain Davies-Meyer Scheme..03
(c) Explain MIME content types with its subtypes.04
OR (c) Describe the RSA algorithm. With Example 04
Que:5 Answer the Following Question (14 marks )
(a) List out the types of virus. Explain any three. 03 OR (a) Explain the types of intruder. AND Explain Malicious Software 03 (b) Define SHA and compare various SHA parameters.03 OR (b) Explain packet filtering firewall. 03 (c) Explain Digital Signature Standard (DSS). 04 OR (c) Explain D secure protocol in brief. 04
Que:6 Answer the Following Question (14 marks )
(a) Give difference between symmetric & asymmetric key cryptography 03 OR (a) Explain HTTPS connection initiation process.03 (b) Explain MIME in detail.03 OR (b) Explain firewall characteristics. 03 (c) Explain MD5 hashing in brief. 04 OR (c) Explain MAC in detail. 04