Roll No.
Total No. of Questions : 08
Total No. of Pages : 02
--- Content provided by FirstRanker.com ---
M.Tech.(IT) (Sem.-1)
NETWORK SECURITY
Subject Code : CS-503
M.Code: 35404
Time: 3 Hrs. Max. Marks : 100
--- Content provided by FirstRanker.com ---
INSTRUCTIONS TO CANDIDATES :
- Attempt any FIVE questions out of EIGHT questions.
- Each question carries TWENTY marks.
- What is a transaction oriented application? Explain with a suitable example.
- What are the various Multicasting routing protocol? Explain any three of them.
- Which of the following is one advantage that FDDI has over Token ring? Explain with example :
- Fibre optic cable is difficult to wiretap
- FDDI is capable of isolating cable breaks
- FDDI provides fair and timely access to networks
- FDDI has built in ring management
- What are similarities and differences between OSI and TCP reference models? UDP is a connectionless protocol. Why does its exist? Explain.
- What is digital signature? How encryption is used in it?
- What are the security requirements for a computer Network? Explain.
- Explain the following :
- Methods of password cracking
- Man-in-the-Middle attacks
- IP Sniffing
- Key(stroke) loggers
--- Content provided by FirstRanker.com ---
-
- What is the role of WEP in making a network secure?
- What is Wireless DOS attack?
- Explain three hacking tools.
- What is the 802.11 standard?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.
--- Content provided by FirstRanker.com ---
This download link is referred from the post: PTU M.Tech 1st Semester Last 10 Years 2010-2020 Previous Question Papers|| Punjab Technical University
--- Content provided by FirstRanker.com ---