FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem Supply 2018 Feb 9D08205 Cryptography And Network Security Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester Supply 2018 Feb 9D08205 Cryptography And Network Security Previous Question Paper || Download M.Tech 2nd Sem 9D08205 Cryptography And Network Security Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


M.Tech II Semester Supplementary Examinations February 2018

CRYPTOGRAPHY & NETWORK SECURITY

(Computer Networks)

(For students admitted in 2012, 2013, 2014, 2015 & 2016 only)

Max. Marks: 60

--- Content provided by FirstRanker.com ---

Answer any FIVE questions

All questions carry equal marks


  1. (a) What is an attack? List the types of attacks. Briefly describe the classification of attacks.
    (b) Define various mathematical tools for cryptography in details.
  2. Explain the process of encryption and decryption in DES (Data encryption standard) algorithm.
  3. --- Content provided by FirstRanker.com ---

  4. (a) Define digital signature. Explain its role in network security.
    (b) Illustrate with an example the process involved in RSA algorithm.
  5. (a) Define and explain various user authentication protocols.
    (b) Give the complete clarity among HMAC and CMAC.
  6. (a) Explain the digital signature algorithm with an example.

    --- Content provided by FirstRanker.com ---

    (b) What is public key infrastructure? How PKI is managed in India?
  7. Explain security handshake pitfalls in detail.
  8. (a) Explain the operational description of (pretty good privacy) PGP.
    (b) Explain X.509 authentication service.
  9. (a) Explain the intrusion detection tool audit records.

    --- Content provided by FirstRanker.com ---

    (b) List and briefly define four techniques used to avoid guessable password.

Visit FirstRanker.com



--- Content provided by FirstRanker.com ---

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)