Computer Science and Engineering
Computer Science and Engineering
Computer Science and Engineering
JJ JJ
Time: 3 hours
JJ JJ
INFORMATION SECURITY
JJ
(Computer Science and Engineering) JJMax. Marks: 75
JJ J
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
JJ JJ JJ JJ JJ JJ JJ J
10 marks and may have a, b, c as sub questions.
PART - A
(25 Marks)
JJ JJ JJ JJ JJ JJ JJ J
c) Differentiate conventional & public key encryption. [2]
d) What is traffic Padding? What is its purpose? [3]
e) What is the purpose of X.509 standard? [2]
f) In the content of Kerberos, what is realm? [3]
g) Explain the reasons for using PGP. [2]
h) Compare Transport mode and Tunnel Mode. [3]
i) What do you mean by malicious software? [2]
j) What is application level gateway? [3]
JJ JJ JJ JJ
PART - B JJ JJ JJ
(50 Marks)
J
2.a) Explain how gateway works in internetwork security model.
b) Explain the various types of cryptanalytic attacks. [5+5]
OR
JJ JJ JJ JJ JJ JJ JJ J
3. Explain symmetric and asymmetric key criptography. [10]
4.a) Explain how key exchange is done using Diffie-Hellman key exchange.
b) Discuss the “man-in-the-middle” attack. [5+5]
OR
5. Explain Blowfish algorithm. [10]
JJ JJ JJ JJ JJ JJ JJ J
6.a) What is HMAC and what are its advantages over MAC?
b) Discuss different approaches to Message Authentication. [5+5]
OR
7. Discuss the requirements of Kerberos. Explain the Kerberos ver-4 message exchanges.
[10]
JJ JJ JJ JJ JJ JJ JJ J
JJ JJ JJ JJ JJ JJ JJ J
8.a) Explain the different MIME content types.
b) Explain S/MIME certificate processing method. [5+5]
OR
JJ 9.a)
b) JJ JJ JJ
What are the applications of IP security?
JJ JJ JJ
Describe the general structure of IPSEC authentication header. Discuss how anti-reply
service is supported. [5+5]
J
10. Explain the different types of firewalls with neat diagrams. [10]
OR
11. Discuss about Intrusion Detection and approaches of Intrusion Detection. [10]
JJ JJ JJ JJ JJ JJ JJ J
---ooOoo---
JJ JJ JJ JJ JJ JJ JJ J
JJ JJ JJ JJ JJ JJ JJ J
JJ JJ JJ JJ JJ JJ JJ J
JJ JJ JJ JJ JJ JJ JJ J
JJ JJ JJ JJ JJ JJ JJ J