FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU B.Tech 2020 March CSE-IT 6th Sem BTIT 602 Information Security And Risk Management Question Paper

Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) ) BE/BTech CSE/IT (Computer Science And Engineering/ Information Technology) 2020 March 6th Sem BTIT 602 Information Security And Risk Management Previous Question Paper

This post was last modified on 21 March 2020

PTU B.Tech Question Papers 2020 March (All Branches)


FirstRanker.com

Roll No. [ TTTTTT] [ ] Total No. of Pages : 02
Total No. of Questions : 09

--- Content provided by⁠ FirstRanker.com ---

B.Tech.(IT) (2012 to 2017) (Sem.-6)
INFORMATION SECURITY AND RISK MANAGEMENT
Subject Code : BTIT-602
M.Code : 71172
Time : 3 Hrs. Max. Marks : 60

--- Content provided by⁠ FirstRanker.com ---

INSTRUCTION TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by‌ FirstRanker.com ---

Q1) Answer briefly :

  1. What is a one way function?
  2. Name three broad categories of applications of public key cryptosystem.
  3. What are key principles of security?
  4. What is a public key certificate?
  5. --- Content provided by‌ FirstRanker.com ---

  6. What are the properties a digital signature should have?
  7. Why does PGP generate a signature before applying compression?
  8. What protocols comprise SSL?
  9. What is threat assessment?
  10. What is Information Security Life Cycle?
  11. --- Content provided by FirstRanker.com ---

  12. What are IPSec protocols?

SECTION-B

Q2) Using e = 13, d = 37, and n = 77 in the RSA algorithm, encrypt the message “GOOD” using the values of 00 to 25 for letters A to Z. For simplicity, do the encryption and decryption character by character.

Q3) What requirements must a public-key cryptosystem fulfill to be a secure algorithm?

Q4) What is message Integrity? What are the different ways of preserving the integrity of a document?

--- Content provided by​ FirstRanker.com ---

Q5) What are various types of malicious programs? Explain various types of Viruses.

Q6) Comment on the differences between MD4 and MDS5. Specifically, to what extent do you think that MDS5 is stronger than MD4, and why?

SECTION-C

Q7) In Secure Socket Layer (SSL) and Transport Layer Security (TLS), why is there a separate Change Cipher Spec Protocol, rather than including a change cipher spec message in the Handshake Protocol?

Q8) What is message authentication? What types of attacks are addressed by message authentication? List some approaches to producing message authentication. In what ways can a hash value be secured so as to provide message authentication?

--- Content provided by⁠ FirstRanker.com ---

Q9) Explain various modes of Risk Analysis.

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC against the Student.



--- Content provided by​ FirstRanker.com ---

This download link is referred from the post: PTU B.Tech Question Papers 2020 March (All Branches)