Regular Theory Examination Odd Sem., VIII, 2016-17
B.TECH
--- Content provided by FirstRanker.com ---
CRYPTOGRAPHY AND NETWORK SECURITY
Paper- I
Time: 3 Hours
Maximum Marks: 100
Note: Attempt all Sections. If required any missing data; then do it assumingly.
--- Content provided by FirstRanker.com ---
(10×2=20)
SECTION-A
- Answer the following briefly:
- What do you mean by cryptography?
- Explain Fisher effect.
- What are the average authentication costs?
- Explain correlation.
- Differentiate between threat and attacks.
- Distinguish between security policies and security mechanism.
- Where do you use security mechanism?
- What is Kerberos?
- What is IP security?
- IPTO
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
NIT-701
(Following Paper ID and Roll No. to be filled in your Answer Books)
--- Content provided by FirstRanker.com ---
Paper ID : 228803
Roll No. :
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University