FirstRanker.com
Firstranker's choice
Code No: 824AE Rl 5
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
FirstRanker.com
MCA 1V Semester Examinations, January - 2018
INFORMATION SECURITY
Time: 3hrs Max.Marks:75
--- Content provided by FirstRanker.com ---
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A
5 x 5 Marks = 25
- Explain in detail various types of attacks on encrypted messages. (5)
- Explain briefly about RSA algorithm in detail manner. (5)
- Describe how hash algorithms will provide security. (5)
- Explain about IP traffic processing in IP security Policy. (5)
- Define firewall. Explain the firewall design principles in a detail manner. (5)
--- Content provided by FirstRanker.com ---
PART -B
--- Content provided by FirstRanker.com ---
5 x 10 Marks = 50
- a) Explain about the model for internetwork security.
b) Convert the following plain text message P.= “cryptography provides high security” into cipher text by using simple columnar transposition technique
i) Basic technique
ii) With multiple rounds. [5+5]--- Content provided by FirstRanker.com ---
OR
With a neat diagram explain-simplified model of conventional Encryption. - a) Differentiate between symmetric and asymmetric key cryptography. [6+4]
b) Illustrate the procedure of key distribution in conventional encryption.
OR--- Content provided by FirstRanker.com ---
a) Differentiate between AES, DES and Blow fish algorithms. [7+3]
b) Explain round function evaluation in feistel cipher structure. - a) Write the difference between session key and master key. [7+3]
b) Write in detail what types of attacks are addressed by message authentication.
OR--- Content provided by FirstRanker.com ---
a) Describe what arithmetical and logical functions are used in MD5? [6+4]
b) With a neat diagram explain Kerberos security mechanism. And also explain how Kerberos is important in real time for providing security? - a) What is the difference between a public key and private key. [7+3]
b) Explain on what basis Zimmerman has developed PGP for email security?
OR--- Content provided by FirstRanker.com ---
a) With a neat diagram explain function modules and standardized protocols used between them in Internet mail architecture. [5+5]
b) Explain in detail about IP security overview? - a) Write the difference between PGP and MIME types. [7+3]
b) Write in a detail manner that define the parameters of an SSL session state.
OR--- Content provided by FirstRanker.com ---
a) Write differences between socket layer security and transport security. [7+3]
b) Briefly explain What are the different types of firewalls. - a) Enumerate counter measures for viruses and worms. [6+4]
FirstRanker.com
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university