FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download VTU B.Tech (BE) 8th Sem 2020 Jan 10CSIS835 I nformation and Network Security Question Paper

Download VTU (Visvesvaraya Technological University) 8th Semester (Eight Semester) 2020 January 10CSIS835 I nformation and Network Security Previous Question Paper

This post was last modified on 11 April 2020

USN
10CS/IS835
2020


--- Content provided by FirstRanker.com ---

11
DR P. G HALA
Wil
OF ENGFNEERIN
, .

--- Content provided by FirstRanker.com ---

Eighth
Semester B.E. Degree Examination, Dec.2019/Jan.
I nformation and Network Security
Time: 3 hrs.
Max. Marks:100

--- Content provided by FirstRanker.com ---

Note: Answer any FIVE full questions, selecting
at least TWO questions from each part.
PART ? A
1 a. Explain the three types of security policies defined in planning security.
b. Describe the major steps involved in contingency planning with neat diagram.

--- Content provided by FirstRanker.com ---

2 a. What are firewalls? Explain the processing modes of firewalls.
b. Give the best practices for firewall.
c. How do y protect remote connections? Explain.
(10 Marks)
(10 Marks)

--- Content provided by FirstRanker.com ---

(06 Marks)
(06 Marks)
(08 Marks)
3 a. List the organizational requirements and constraints involved
Detection System (IDS)

--- Content provided by FirstRanker.com ---

b. Compare Honey pots, Honey nets and padded cell systems.
c. How to deploy and implement IDS? Explain.
4 a. Define Cryptography, Cryptosystems and Cryptanalysis.
b. Compare substitution ciphers with transposition ciphers.
c. Describe any two types of Cryptographic tools.

--- Content provided by FirstRanker.com ---

in designing Intrusion
(06 Marks)
(06 Marks)
(08 Marks)
(06 Marks)

--- Content provided by FirstRanker.com ---

(06 Marks)
(08 Marks)
PART ? B
5 a. Compare Kerberos version 4.0 with 5.0.
b. Describe the varis security mechanisms defined in X.800 services.

--- Content provided by FirstRanker.com ---

c. Explain the modes network security with the aid of diagram.
6 a. What is PGP? Explain the PGP cryptographic functions with neat diagrams.
b. Explain the MIME content types of S/MIME functionalities.
(06 Marks)
(06 Marks)

--- Content provided by FirstRanker.com ---

(08 Marks)
(10 Marks)
(10 Marks)
7 a. Give the application and benefits of IP security. (06 Marks)
b. How the Oakley key determination protocol is different from Diffie ? Hellman algorithm?

--- Content provided by FirstRanker.com ---

Explain. (06 Marks)
c. Explain Authentication Header and ESP protocol with formats. (08 Marks)
8 a. Explain SSL protocol architecture in detail. (10 Marks)
b. What is SET? Explain how the cardholder sends purchase request via SET. (10 Marks)
FirstRanker.com - FirstRanker's Choice

--- Content provided by FirstRanker.com ---