FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU B-Tech CSE-IT 2020 Dec 6th Sem 71113 Information Security Question Paper

Download PTU (I.K.Gujral Punjab Technical University (IKGPTU)) B-Tech (Bachelor of Technology) (CSE-IT)- Computer Science Engineering -Information Technology 2020 December 6th Sem 71113 Information Security Previous Question Paper

This post was last modified on 13 February 2021

PTU B.Tech Question Papers 2020 December (All Branches)


FirstRanker.com

Roll No. [ ] [ ] [ ] Total No. of Pages : 02
Total No. of Questions : 18

--- Content provided by​ FirstRanker.com ---

B.Tech. (CSE/ IT) (2012 to 2017) (Sem.-6)
INFORMATION SECURITY
Subject Code : BTCS-904
M.Code : 71113
Time : 3 Hrs. Max. Marks : 60

--- Content provided by‌ FirstRanker.com ---

INSTRUCTION TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by FirstRanker.com ---

Answer briefly :

  1. Define data confidentiality.
  2. What is steganography in information security?
  3. Define substitution techniques.
  4. What is random number generator?
  5. --- Content provided by​ FirstRanker.com ---

  6. Write a short note on RSA.
  7. Discuss the importance of digital signatures.
  8. Write the purpose of TLS.
  9. Give introduction of IPsec.
  10. What is meant by Kerberos?
  11. --- Content provided by⁠ FirstRanker.com ---

  12. What is Malicious software in Information Security?

FirstRanker.com

SECTION-B

  1. Explain and draw the network security model.
  2. Explain the principle of Diffie Hellman Key Exchange algorithm by taking an example.
  3. --- Content provided by‌ FirstRanker.com ---

  4. Discuss the use of Message Authentication Code algorithm to provide message authentication.
  5. What is X. 509 authentication service and what is its purpose?
  6. How Secure Electronic Transaction (SET) is used for the security of financial transactions on the Internet?

SECTION-C

  1. Explain the functioning of DES algorithm using the block diagram. Discuss the strength of DES.
  2. --- Content provided by‍ FirstRanker.com ---

  3. Discuss the Web Security issues. Which are the key Web services security requirements?
  4. What are Firewalls? Illustrate how they deny the viruses and related threats?

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC case against the Student.

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: PTU B.Tech Question Papers 2020 December (All Branches)