Nothing Special   »   [go: up one dir, main page]

Msei22 Pyq

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

No.

of Printed Pages : 4 MSEI-022

P, G. DIPLOMA IN INFORMATION
SECURITY (PGDIS)
Term-End Examination
June, 2020
MSEI-022 : NETWORK SECURITY
Time : 2 Hours Maximum Marks : 50

Note : (i) Section A: Answer all the objective type


questions.
(ii) Section B : Answer all the very short
answer type questions.
(iii) Section C : Answer any two out of three
short answer type questions.
(iv) Section D : Answer an y two out of three
long answer type questions.
Section—A
1. Write true or false : 1 each
(a) IPSec is designed to provide the security at
the transport layer.

P. T. O.
[2] MSEI-022

(b) A firewall is a device with set of rules to

permit ordinary network access by

unauthorized services.

(c) Fingerprints can be used for identification.

(d) Network layer firewall is only stateful

never stateless firewall.

(e) The private key of digital signature is used

by the sender.

2. Fill in the blanks : 1 each

(a) A is a software or hardware based

network security system that controls the

incoming and outgoing network traffic

based on applied rule-set.

(b) is a secret-key network

authentication service developed at MIT by

Project Athena.

(c) Full form of CHAP is


[ 31 MSEI-022

(d) Algorithm for performing encryption and

decryption is known as

(e) port is used for SMTPS + TLS

security.

Section—B

3. Write short notes on the following : 2 each

(a) Asymmetric cryptography

(b) Trojan horses

(c) Port Scanning tools

(d) Biometrics

(e) Public key infrastructure

Section—C

4. Explain security issues involved in wireless. 5

5. Discuss the types of digital watermarks. 5

6. Explain IDS and IPS. Is honey pot and IDS or

IPS ?Justify your answer. 5

P. T. 0.
[ 4I MSEI-022

Section—D

7. Explain next generation networks. 10

8. Explain identity management. What does

Single Sign On (SSO) mean and how is it

typically implemented ? 10

9. Explain the role of a firewall in securing the

network. Describe different types of firewall. 10

MESI-022
No. of Printed Pages : 5 MSEI-022

P.G. DIPLOMA IN INFORMATION SECURITY


(PGDIS)
Term-End Examination
February, 2021

MSEI-022 : NETWORK SECURITY


Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.

SECTION A

Answer all the questions.

1. Write True or False : 51=5

(a) Network layer firewall is only Stateful,


never Stateless firewall.

(b) Hyper Text Transfer Protocol (http) is a


means for transmitting and receiving
information across the internet.
MSEI-022 1 P.T.O.
(c) WEP is more secure than WPA2 Protocol.
(d) The main objective of SSL is
authenticating the client and server to
each other.
(e) Digital Signature requires the sender to
use the private key.

2. Fill in the blanks : 51=5

(a) A ________ is a device that forwards


packets between networks by processing
the routing information in the packet.

(b) DES is a ________ Cipher.

(c) Full form of LDAP is ________.

(d) Algorithm for performing encryption and


decryption is known as ________.

(e) PGP stands for ________.

MSEI-022 2
SECTION B
Attempt all the questions.

3. Write short notes on the following : 52=10


(a) Biometrics
(b) IDS
(c) Risk Analysis

(d) Honey Pots


(e) Digital Watermarking

MSEI-022 3 P.T.O.
SECTION C

Answer any two questions out of the three short


answer type questions.

4. Explain Fingerprinting technique of identity


management. 5

5. Explain the main features of a Hash function. 5

6. Explain how key distribution is achieved in


Symmetric key encryption. 5

MSEI-022 4
SECTION D

Answer any two questions out of three long answer


type questions.

7. Explain the concept of Network Based,


Application Based and Host Based Firewalls in
detail. 10

8. Explain Identity Management. What does Single


Sign On (SSO) mean and how is it typically
implemented ? 10

9. Explain the basic scanning techniques in detail. 10

MSEI-022 5 P.T.O.
No. of Printed Pages : 5 MSEI-022

P.G. DIPLOMA IN INFORMATION SECURITY


(PGDIS)
Term-End Examination
June, 2021

MSEI-022 : NETWORK SECURITY


Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.

SECTION A

Answer all the questions.

1. Write True or False : 51=5

(a) Symmetric encryption is best used for


small blocks of data, digital signatures,
digital envelopes and digital certificates.

(b) IPSec is designed to provide security at the


transport layer.
MSEI-022 1 P.T.O.
(c) Bluetooth is an example of PAN.
(d) Full form of PGP is Pretty Good Privacy.
(e) WEP is less secure than WPA.

2. Fill in the blanks : 51=5

(a) The signal where the watermark is to be


embedded is called the __________ .

(b) An attempt to make a computer resource


unavailable to users is called __________
attack.

(c) A network of compromised devices owned


by attackers is known as ___________ .

(d) The multiple access technique used by


IEEE 802.11 standard for wireless LAN is
___________ .

(e) __________ can be defined as the practice


and study of hiding information.

MSEI-022 2
SECTION B
Answer all the questions.

3. Write short notes on the following : 52=10


(a) E-mail spoofing
(b) Trojan horses
(c) Hash function

(d) Port scanning tools


(e) Routers

MSEI-022 3 P.T.O.
SECTION C

Answer any two questions out of three short answer


type questions.

4. Illustrate the difference between symmetric


cryptography and asymmetric cryptography. 5

5. Explain in detail about ‘‘Key’’ establishment and


its types. 5

6. Explain Vulnerabilities, Threats, Attacks and


Controls with suitable example of each. 5

MSEI-022 4
SECTION D

Answer any two questions out of three long answer


type questions.

7. Explain types of Firewalls with the help of


diagram. 10

8. Explain Diffie-Hellman key exchange protocol. Is


it prone to MITM attack ? Why or why not ?
Discuss and explain. 10

9. Explain Network Layer Attack. Discuss Packet


Sniffing in detail. 10

MSEI-022 5 P.T.O.
[2] MSEI-022

(b) Digital signature requires the sender to


No. of Printed Pages : 4 MSEI-022
use the private key.

P. G. DIPLOMA IN INFORMATION (c) Bluetooth is an example of PAN.


SECURITY (PGDIS) (d) SING is a GUI scanning technique.
Term-End Examination
(e) Full form of PGP is Pretty Good Privacy.
December, 2021
MSEI-022 : NETWORK SECURITY 2. Fill in the blanks : 1 each

Time : 2 Hours Maximum Marks : 50 (a) Full form of CHAP is ................ .


Note : Section A : Answer all the Objective type (b) Firewalls are often configured to block
questions.
.............. traffic.
Section B : Answer all the Very short answer (c) The signal where the watermark is to be
type questions.
embedded is called the .................. .
Section C : Answer 2 out of 3 Short answer
(d) DES is a ................ cipher.
type questions.
(e) Kerberos is a ................. key authentication
Section D : Answer 2 out of 3 Long answer
type questions. service developed at MIT.

Section—B
Section—A Note : Attempt all the very short answer type
Note : Attempt all objective type questions.
questions.
1. Write True or False : 1 each
3. Write short notes on the following : 2 each
(a) Network layer firewall works as a Packet
Filter. (a) Hash function

P. T. O.
[3] MSEI-022 [4] MSEI-022

(b) E-mail spoofing 8. Describe the security protocols in detail, with

(c) Biometrics suitable examples. 10

(d) Honey pots 9. Describe identity management. What does


(e) Session hijacking Single Sign On (SSO) mean and how is it

Section—C typically implemented ? 10

Note : Attempt 2 out of 3 short answer type


questions.

4. What is digital signature ? Describe a public


key method to create and check digital
signatures. 5

5. Explain the difference between symmetric


cryptography and asymmetric cryptography. 5

6. Discuss the types of digital watermarks. 5

Section—D

Note : Attempt 2 out of 3 long answer type


questions.

7. Explain the role of a firewall in securing the


network. Describe different types of firewalls.

10 MSEI–022

P. T. O.
No. of Printed Pages : 5 MSEI-022

MASTER OF SCIENCE (INFORMATION


SECURITY) (MSCIS) / P.G. DIPLOMA IN
INFORMATION SECURITY (PGDIS)
Term-End Examination
June, 2022

MSEI-022 : NETWORK SECURITY


Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.

SECTION A

Answer all the questions.


1. Write True or False : 51=5

(a) Fingerprints can be used for identification.

(b) Network layer firewall is always stateful


and never stateless.
MSEI-022 1 P.T.O.
(c) Hypertext Transfer Protocol (http) is
meant to transmit and receive information
across the Internet.

(d) WEP is more secure than WPA-2 Protocol.

(e) TLS and SSL are protocols used at


Network layer.

2. Fill in the blanks : 51=5

(a) Video watermarking, Audio watermarking,


Text watermarking, etc. are applications of
___________ .

(b) The full form of LDAP is __________ .

(c) A ___________ is a physical trait that


consists of facial structure, eye colour,
voice, iris, pattern and fingerprint.

(d) Algorithms for performing encryption and


decryption are known as __________
algorithms.

(e) A network of compromised devices owned


by attackers are known as ____________ .

MSEI-022 2
SECTION B
Answer all the questions.

3. Write short notes on the following : 52=10

(a) Pretty Good Privacy

(b) Port Scanning Tools

(c) Public Key Infrastructure

(d) Intrusion Detection System

(e) Routers

MSEI-022 3 P.T.O.
SECTION C

Answer any two questions out of three short answer


type questions. 25=10

4. Explain how key distribution is achieved in


symmetric key encryption. 5

5. Illustrate the difference between SSH and SSL.


Which one is more secure ? Which of the
two, i.e. SSH and SSL has more potential
vulnerabilities ? Explain. 5

6. Describe the main properties of Digital


Signatures. 5

MSEI-022 4
SECTION D

Answer any two questions out of three long answer


type questions. 210=20

7. What are various security issues in wireless


connections ? Explain the process of WEP
encryption and WEP decryption, with the help of
a suitable diagram. 10

8. Explain authentication mechanism, with the help


of a suitable diagram. 10

9. Describe IDS and IPS. Is Honey Pot an IDS or an


IPS ? Justify your answer. 10

MSEI-022 5 P.T.O.
No. of Printed Pages : 3 MSEI-022

MASTER OF SCIENCE (INFORMATION


SECURITY) (MSCIS) / P.G. DIPLOMA IN
INFORMATION SECURITY (PGDIS)
Term-End Examination
December, 2022

MSEI-022 : NETWORK SECURITY


Time : 2 hours Maximum Marks : 50

Note :
Section A – Answer all the questions.
Section B – Answer any two out of three questions.
Section C – Answer any two questions out of three long
answer type questions.

SECTION A

Answer all the questions.


1. Write notes on the following : 54=20

(a) Trojan Horse

(b) E-mail Spoofing

(c) Port Scanning Tools

(d) Pretty Good Privacy

(e) Undeniable Signatures


MSEI-022 1 P.T.O.
SECTION B
Answer any two out of three questions. 25=10

2. Describe the types of digital watermarks. 5

3. What is the difference between Symmetric and


Asymmetric Cryptography ? 5

4. What are the main properties of a Hash


Function ? 5

MSEI-022 2
SECTION C

Answer any two questions out of three long answer


type questions. 210=20

5. Describe the role of a firewall in securing the


network. Also explain different types of firewalls. 10

6. Explain Identity Management. What does Single


Sign On (SSO) mean and how is it typically
implemented ? 10

7. Explain Diffie Hellman’s key exchange protocol.


Is it prone to MITM attack ? Why or why not ?
Discuss and explain. 10

MSEI-022 3 P.T.O.
No. of Printed Pages : 3 MSEI-022

MASTER OF SCIENCE
(INFORMATION SECURITY) /
P. G. DIPLOMA IN INFORMATION
SECURITY (MSCIS / PGDIS)
Term-End Examination
June, 2023
MSEI-022 : NETWORK SECURITY

Time : 2 Hours Maximum Marks : 50

Note : Section A : Answer all the questions.

Section B : Answer any two out of three


questions.

Section C : Answer any two out of three long


answer type questions.

Section—A
Note : Attempt all the questions.

1. Write notes on the following : 5×4=20

(a) Intrusion Detection System

P. T. O.
[2] MSEI-022

(b) Hash function

(c) Digital watermarking

(d) Dictionary attack

(e) Honey pots

Section—B
Note : Attempt two out of three questions.

2. Describe fingerprinting technique of identity


management. 5

3. Briefly explain main properties of digital


signatures. 5

4. Define vulnerabilities, threats, attacks and


controls with suitable example of each. 5

Section—C

Note : Attempt two out of three long answer type


questions.

5. Describe the concept of Network Based,


Application Based and Host Based Firewalls in
detail. 10
[3]

6. What is cryptography ? Explain the different


stages of cryptology in detail. 10

7. What are various security issues in wireless ?


Explain the process of WEP encryption and
WEB decryption with the help of a suitable
diagram. 10

MSEI–022

You might also like