FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download DU (University of Delhi) B-Tech 7th Semester 1492 CS 702 Information Security Question Paper

Download DU (University of Delhi) B-Tech (Bachelor of Technology) 7th Semester 1492 CS 702 Information Security Question Paper

This post was last modified on 31 January 2020

CBSC NCERT Class 1 Important Worksheets Chapter Wise || Central Board of Secondary Education


FirstRanker.com

This question paper contains 4 printed pages]

S. No. of Question Paper: 1492 Roll No.
Unique Paper Code : 2341702 F-7
Name of the Paper : CS-702 Information Security
Name of the Course : B.Tech. Computer Science
Semester : VII
Duration: 3 Hours Maximum Marks: 75

(Write your Roll No. on the top immediately on receipt of this question paper.)

--- Content provided by‌ FirstRanker.com ---

Section A is compulsory.

Attempt any four questions from Section B.

Parts of a question must be answered together.

Section A

  1. (a) List the different layers of an organization where security must be implemented to protect its operations. 3
  2. --- Content provided by‌ FirstRanker.com ---

  3. (b) Assume a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into ? 2
  4. (c) What measures can individuals take to protect against shoulder surfing? 1
  5. (d) Differentiate between Honeynet, Honeypot and Padded cell systems. 3
  6. (e)
    1. (i) Define Generator and Parity Check Matrix.
    2. (ii) How can parity check matrix be used to generate codeword ?
    3. --- Content provided by‍ FirstRanker.com ---

    4. (iii) Define minimum weight of the code. 2+2+1
  7. (f) Describe linear block code. Explain the difference between hamming distance and hamming weight. 3
  8. (g) Define congruence and compare with equality. 2
  9. (h) Explain modulo operator along with its application. Also define residue classes with an example. 2
  10. --- Content provided by FirstRanker.com ---

  11. (i) Explain whether the following cipher is monoalphabetic or not. Given reason also.
    Plain text: Frittata
    Ciphertext: LTOHHQJQ 2
  12. (j) Use the Additive cipher to encrypt the message "HelloAbraham" with key = 10. 3
  13. (k) Explain transposition cipher with a suitable example. 3
  14. --- Content provided by⁠ FirstRanker.com ---

  15. (l) How many permutation tables are used in Data Encryption Standard cipher ? 2
  16. (m) Differentiate between the following: 2+2
    1. (i) Digital Signature and conventional signature
    2. (ii) Public key and Private key.

Section B

--- Content provided by​ FirstRanker.com ---

  1. (a) Explain the steps of Diffie-Hellman Key exchange protocol. What is the most common attack on this protocol ? 5
  2. (b) Assume a language with 8 letters: A, B, C, K, L, O, T, Y, where A is 0, B is 1, C is 2, K is 3, L is 4, O is 5, T is 6, Y is 7. In order to encrypt a word in this language, we convert the letters into binary form, apply the scheme shown in the diagram given below and convert them back to corresponding letters. Using the above algorithm, encrypt the word : KAL. 5

    This download link is referred from the post: CBSC NCERT Class 1 Important Worksheets Chapter Wise || Central Board of Secondary Education

--- Content provided by‌ FirstRanker.com ---