FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU M.Tech IT 1st Semester 35404 NETWORK SECURITY Question Paper

Download PTU. I.K. Gujral Punjab Technical University (IKGPTU) M.Tech IT 1st Semester 35404 NETWORK SECURITY Question Paper.

This post was last modified on 13 December 2019

PTU M.Tech 1st Semester Last 10 Years 2010-2020 Previous Question Papers|| Punjab Technical University


Roll No.

Total No. of Questions : 08

Total No. of Pages : 02

--- Content provided by​ FirstRanker.com ---

M.Tech.(IT) (Sem.-1)

NETWORK SECURITY

Subject Code : CS-503

M.Code: 35404

Time: 3 Hrs. Max. Marks : 100

--- Content provided by​ FirstRanker.com ---

INSTRUCTIONS TO CANDIDATES :

  1. Attempt any FIVE questions out of EIGHT questions.
  2. Each question carries TWENTY marks.
  1. What is a transaction oriented application? Explain with a suitable example.
  2. What are the various Multicasting routing protocol? Explain any three of them.
  3. --- Content provided by​ FirstRanker.com ---

  4. Which of the following is one advantage that FDDI has over Token ring? Explain with example :
    1. Fibre optic cable is difficult to wiretap
    2. FDDI is capable of isolating cable breaks
    3. FDDI provides fair and timely access to networks
    4. FDDI has built in ring management
  5. --- Content provided by​ FirstRanker.com ---

  6. What are similarities and differences between OSI and TCP reference models? UDP is a connectionless protocol. Why does its exist? Explain.
  7. What is digital signature? How encryption is used in it?
  8. What are the security requirements for a computer Network? Explain.
  9. Explain the following :
    1. Methods of password cracking
    2. Man-in-the-Middle attacks
    3. --- Content provided by​ FirstRanker.com ---

    4. IP Sniffing
    5. Key(stroke) loggers
    1. What is the role of WEP in making a network secure?
    2. What is Wireless DOS attack?
    3. --- Content provided by⁠ FirstRanker.com ---

    4. Explain three hacking tools.
    5. What is the 802.11 standard?

NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.

FirstRanker.com

--- Content provided by‌ FirstRanker.com ---

FirstRanker.com



This download link is referred from the post: PTU M.Tech 1st Semester Last 10 Years 2010-2020 Previous Question Papers|| Punjab Technical University

--- Content provided by FirstRanker.com ---