Download PTU M.Tech IT 1st Semester 35404 NETWORK SECURITY Question Paper

Download PTU. I.K. Gujral Punjab Technical University (IKGPTU) M.Tech IT 1st Semester 35404 NETWORK SECURITY Question Paper.

1 | M-35404 (S9)-2451

Roll No. Total No. of Pages : 02
Total No. of Questions : 08
M.Tech.(IT) (Sem.?1)
NETWORK SECURITY
Subject Code : CS-503
M.Code : 35404
Time : 3 Hrs. Max. Marks : 100

INSTRUCTIONS TO CANDIDATES :
1. Attempt any FIVE questions out of EIGHT questions.
2. Each question carries TWENTY marks.

1. What is a transaction oriented application? Explain with a suitable example.
2. What are the various Multicasting routing protocol? Explain any three of them.
3. Which of the following is one advantage that FDDI has over Token ring? Explain with
example :
a. Fibre optic cable is difficult to wiretap
b. FDDI is capable of isolating cable breaks
c. FDDI provides fair and timely access to networks
d. FDDI has built in ring management
4. What are similarities and differences between OSI and TCP reference models? UDP is a
connectionless protocol. Why does its exist? Explain.
5. What is digital signature? How encryption is used in it?
6. What are the security requiremenst for a computer Network? Explain.

FirstRanker.com - FirstRanker's Choice
1 | M-35404 (S9)-2451

Roll No. Total No. of Pages : 02
Total No. of Questions : 08
M.Tech.(IT) (Sem.?1)
NETWORK SECURITY
Subject Code : CS-503
M.Code : 35404
Time : 3 Hrs. Max. Marks : 100

INSTRUCTIONS TO CANDIDATES :
1. Attempt any FIVE questions out of EIGHT questions.
2. Each question carries TWENTY marks.

1. What is a transaction oriented application? Explain with a suitable example.
2. What are the various Multicasting routing protocol? Explain any three of them.
3. Which of the following is one advantage that FDDI has over Token ring? Explain with
example :
a. Fibre optic cable is difficult to wiretap
b. FDDI is capable of isolating cable breaks
c. FDDI provides fair and timely access to networks
d. FDDI has built in ring management
4. What are similarities and differences between OSI and TCP reference models? UDP is a
connectionless protocol. Why does its exist? Explain.
5. What is digital signature? How encryption is used in it?
6. What are the security requiremenst for a computer Network? Explain.

2 | M-35404 (S9)-2451

7. Explain the following :
a. Methods of password cracking
b. Man-in-the-Middle attacks
c. IP Sniffing
d. Key(stroke) loggers
8. a. What is the role of WEP in making a network secure?
b. What is Wireless DOS attack?
c. Explain three hacking tools.
d. What is the 802.11 standard?










NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any
page of Answer Sheet will lead to UMC against the Student.
FirstRanker.com - FirstRanker's Choice

This post was last modified on 13 December 2019