10CS/IS835
2020
--- Content provided by FirstRanker.com ---
11DR P. G HALA
Wil
OF ENGFNEERIN
, .
--- Content provided by FirstRanker.com ---
EighthSemester B.E. Degree Examination, Dec.2019/Jan.
I nformation and Network Security
Time: 3 hrs.
Max. Marks:100
--- Content provided by FirstRanker.com ---
Note: Answer any FIVE full questions, selectingat least TWO questions from each part.
PART ? A
1 a. Explain the three types of security policies defined in planning security.
b. Describe the major steps involved in contingency planning with neat diagram.
--- Content provided by FirstRanker.com ---
2 a. What are firewalls? Explain the processing modes of firewalls.b. Give the best practices for firewall.
c. How do y protect remote connections? Explain.
(10 Marks)
(10 Marks)
--- Content provided by FirstRanker.com ---
(06 Marks)(06 Marks)
(08 Marks)
3 a. List the organizational requirements and constraints involved
Detection System (IDS)
--- Content provided by FirstRanker.com ---
b. Compare Honey pots, Honey nets and padded cell systems.c. How to deploy and implement IDS? Explain.
4 a. Define Cryptography, Cryptosystems and Cryptanalysis.
b. Compare substitution ciphers with transposition ciphers.
c. Describe any two types of Cryptographic tools.
--- Content provided by FirstRanker.com ---
in designing Intrusion(06 Marks)
(06 Marks)
(08 Marks)
(06 Marks)
--- Content provided by FirstRanker.com ---
(06 Marks)(08 Marks)
PART ? B
5 a. Compare Kerberos version 4.0 with 5.0.
b. Describe the varis security mechanisms defined in X.800 services.
--- Content provided by FirstRanker.com ---
c. Explain the modes network security with the aid of diagram.6 a. What is PGP? Explain the PGP cryptographic functions with neat diagrams.
b. Explain the MIME content types of S/MIME functionalities.
(06 Marks)
(06 Marks)
--- Content provided by FirstRanker.com ---
(08 Marks)(10 Marks)
(10 Marks)
7 a. Give the application and benefits of IP security. (06 Marks)
b. How the Oakley key determination protocol is different from Diffie ? Hellman algorithm?
--- Content provided by FirstRanker.com ---
Explain. (06 Marks)c. Explain Authentication Header and ESP protocol with formats. (08 Marks)
8 a. Explain SSL protocol architecture in detail. (10 Marks)
b. What is SET? Explain how the cardholder sends purchase request via SET. (10 Marks)
FirstRanker.com - FirstRanker's Choice
--- Content provided by FirstRanker.com ---