Download JNTUH MCA 4th Sem R13 2018 January 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2018 January 814AT Information Security Previous Question Paper


R13

Code No: 814AT

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA IV Semester Examinations, January - 2018

INFORMATION SECURITY



Time: 3 Hours













Max. Marks: 60

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
8 marks and may have a, b, c as sub questions.



PART - A



















5 ? 4 Marks = 20

1.a) What is cryptanalysis and cryptography?











[4]



b) What are roles of public and private key? Specify the applications of the public key

cryptosystem.

















[4]



c) What are the requirements for message authentication?







[4]

d) Why does PGP generate a signature before applying compression?



[4]

e) What is IP address spoofing?













[4]



PART - B

















5 ? 8 Marks = 40

2.a)

Explain Active attacks and Passive Attacks.

b)

What is mono alphabetic cipher? How it is different from Caesar cipher?

[4+4]

OR

3.

Discuss the following:
a) A model for internetwork security. b) Steganography.





[4+4]


4.

Explain Blowfish in detail.













[8]

OR

5.

Discuss the following:
a) Public-key Cryptography Principles



b) RC4 Algorithm



[4+4]


6.

Describe the authentication dialog used by Kerberos for obtaining services from another
realm.



















[8]

OR

7.

Explain the X.509 authentication service.











[8]


8.a)

How can the signed data entity of S/MIME be prepared?

b)

Explain the general format of PGP message.









[4+4]

OR

9.a)

What do you mean by Security Association? Illustrate the parameters that identify the
Security Association.

b) Describe IP security Architecture.













[4+4]


10.

What is the importance of web security? Explain how secure socket layer provides the
reliable service.

















[8]

OR

11.

Explain statistical anomaly detection and rule based intrusion detection system. [8]



---oo0oo---

This post was last modified on 17 March 2023