You are on page 1of 1

BA

8
F
7
B

E5
82
79
Paper / Subject Code: 70653 / Information Security

AA

90

A5

FF
BA

97
24

E5
82
1T00162 - MCA (Sem-II) (R-2020-21) (2 Year Course) / 70653 - Information Security

0B
AA

A7
F0

A5

FF
QP CODE: 10017122 DATE: 01/03/2023.

79
6A

24

AB

82
0B
79
F0
13

A5
A

9
[Time: 3 Hours] [ Marks:80]

7
A

B
FA

B
9
2
6

AA

A7
F0

0
13
BD

79
Please check whether you have got the right question paper.

6A

24

B
A

B
9
84

AA
DF

A7
F0

90
3
N.B: 1. Question No.1 is compulsory.

E5

A1

7
B

24

AB

79
2. Attempt any THREE from the remaining questions.

FF

84

36
DF

BA
F
E5

A1
82
3. Figures to the right indicate full marks.

2 4
A5

A
DF

F0
58
F

13

4A
2
0B

4B

6A
E

B
A
8

02
A5

AA
DF
79

8
2F

13
1. a) Explain Information Security principles. 5

AF
E5
B
79

4
FA
58
0

02
F

84

36
BA

79

2F

AF
5

A1
0B
9
b) Explain Kerberos. 5

B
E
AA

8
7

36
BA

DF
79

BA

58
2F
24

1
9

4B

6A
FE
A

FA
8
7
F0

0
c) Describe working of S/MIME. 5

5
A

79

58
2F

13
BD
6A

24

AB

0B
9

FE

FA
8
A7
F0
3

A5

84
4A

9
A1

F
d) Explain DOS attack. 5

BD
97
A

AB

5
2
0B
2
6

FE
DF

8
7
0
13

A5

84
4A

BA
AF

2F
97
4B

FA

E5
2. a) What is SSL? Explain three major protocols use at SSL.

B
10
02
36

58
7

90
8

FF
D

4A

A
F
E5

A1

BA
97
4B

AB

82
2
FF

6
DF

A7
F0

b) What is Message Digest? Explain MD5 in detail.

90
10
8

A5
A
E5

A1
82

97
B

24

0B
A5

FF

36

A
F

7
0
58

BD

4A

BA
AF

79
1

3. a) Discuss Inference. What are the various approaches to deal with it?
82

10
0B

79
2
A5

FF

84

36

AA
F
79

0
D

BA
AF
E5

A1
82
0B
9

b) What is Firewall? Discuss its types in detail. 24


A7

10
A5

36

AA
DF
79

F0
8
2F
B

E5

A1
0B
9

A
AA

24
8
A7

FF

84

6
F
79

4. a) What is IDS? Explain Statistical Anomaly Detection and Rule based Detection. F0 10
A

3
BD
24

E5

A1
82
B
9

6A
AA

A7
0

90

84

F
AF

13
BD
7
24

b) What is PKI? How does PKI work? 10


E5
2
0B
9
36

AA

FA
8
7
0

84
BA
AF

9
A1

BA

2F

BD
97
4

5
02
6

FE
A

5. a) Explain Euclidean algorithm. Using Euclidean algorithm, find the greatest common
DF

10
7

90
13

84
4A

BA
AF

BA

F
97

divisor of the following:


FA

E5
2
02
6

AA

8
7

90
13

FF
BD

i) 285 and 741 ii) 88 and 220


A
AF

BA
97
4

AB
FA

82
02
84

A7

90
13

A5
BD

A
AF
E5

97

b) Explain RSA algorithm with example. 10


24

B
FA

0B
FF

84

AA

A7
0
13
BD

AF

79
E5

24

B
FA

79
F

84

6. a) Explain Digital Encryption Standard (DES) in detail. 10


6

AA
0
2F

13
BD

BA
AF
E5

24
FA
8
A5

FF

84

36

AA
F0

b) What is MAC? Explain HMAC in detail. 10


BD
E5

A1
82
0B

6A

24
5

84

F
79

F0
BA

2F

13
BD
E5

6A
FA
8
90

A5

FF

4
58

13
BD
7

82
B
79

FA
90

************
5

FF

84
BA

BA

BD
97

E5
82
AA

A7

90

84
BA

F
7
B

E5
2
79
AA

8
90

FF
BA

BA
7
4

82
79
02

90

A5
4A

BA
AF

17122
7

0B
79
02
6

A
13

4A

BA
AF

79
79
02
36

AA

BA
AF
A1

DFA136AF024AABA79790BA582FFE584B
24

You might also like