FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

PTU B.Tech CSE 6th Semester May 2019 71113 INFORMATION SECURITY Question Papers

PTU Punjab Technical University B-Tech May 2019 Question Papers 6th Semester Computer Science Engineering (CSE)

This post was last modified on 04 November 2019

PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University


Roll No. :

Total No. of Pages : 02

Total No. of Questions : 18

--- Content provided by‌ FirstRanker.com ---

B.Tech.(IT) /(CSE) (2011 Onwards E-I) (Sem.-6)

INFORMATION SECURITY

Subject Code : BTCS-904
M.Code: 71113

Time: 3 Hrs. Max. Marks : 60

--- Content provided by‍ FirstRanker.com ---

INSTRUCTION TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by​ FirstRanker.com ---

Write briefly :

  1. What is data Integrity?
  2. Discuss the use of steganography.
  3. Define transposition techniques.
  4. What is traffic confidentiality?
  5. --- Content provided by⁠ FirstRanker.com ---

  6. Give the role of Key management in cryptography.
  7. Define Euler's Theorem.
  8. Give the syntax of MD5 algorithm.
  9. Write the purpose of SSL.
  10. What is X. 509 and why is it important?
  11. --- Content provided by‍ FirstRanker.com ---

  12. What are Intruders in Information Security?

SECTION-B

  1. Explain and draw the OSI security architecture.
  2. Explain the principle of RSA algorithm by taking an example.
  3. What are the message authentication functions? What are its requirements?
  4. --- Content provided by‌ FirstRanker.com ---

  5. How Pretty Good Privacy is used for sending secure encrypted messages in network?
  6. What is Kerberos and how it works to provide the security?

SECTION-C

  1. Explain the importance of DES algorithm by using the block diagram. Discuss the modified modes of DES.
  2. What is IP Security? How IP security architecture is used to provide the security to network packets?
  3. --- Content provided by‍ FirstRanker.com ---

  4. Show how Firewalls inspects network traffic passing through it, and denies or permits based on a set of rules.

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC case against the Student.

For more previous year question papers, visit: FirstRanker.com


--- Content provided by‍ FirstRanker.com ---


This download link is referred from the post: PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University