All posts from

07A71204 Information Security B.Tech Question Paper : scce.ac.in

Name of the College : SREE CHAITANYA COLLEGE OF ENGINEERING
University : JNTUH
Department : Information Technology
Subject Code/Name : 07A71204/INFORMATION SECURITY
Year/Sem : IV/I
Website : scce.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper : https://www.pdfquestion.in/uploads/scce.ac.in/4962-07A71204-INFORMATIONSECURITY.pdf

Information Security Question Paper :

Code No: 07A71204
R07 Set No. 2
IV B.Tech I Semester Examinations,December 2011

Related : Sree Chaitanya College Of Engineering 07A81201 Multimedia Databases B.Tech Question Paper : www.pdfquestion.in/4967.html

Information Technology
Time: 3 hours
Max Marks: 80
Answer any FIVE Questions. All Questions carry equal marks :
1. (a) What is the contribution of Phil Zimmerman towards creation of PGP? Also explain reasons for the popularity of PGP.
(b) Write about the functions of S/MIME and list the cryptographic algorithms adopted by S/MIME. [8+8]

2. (a) Discuss about user security model in detail.
(b) How a viral infection happens initially?
(c) Give a note of types of viruses. [8+2+6]

3. (a) What is a cipher block mode of operation? Explain the use of these modes of operation for the block ciphers for encipherment.
(b) Describe the dierent methods of Message authentication. [8+8]

4. (a) What is WWW? What are the challenges web presents? Discuss.
(b) Explain how SSL makes use of TCP to provide a reliable end-to-end secure service. [6+10]

5. (a) Explain the following related to RSA cryptosystem:
i. What is the one-way function in this system?
ii. What is the trapdoor in this system?
iii. Define the public and private keys in this system.
iv. Describe the security in this system.
(b) Define the X.509 recommendation. State and explain its purpose in detail. [8+8]

6. (a) \A bastion host is a critical strong point in the network’s security”. Justify?
(b) Discuss in detail profile-based anomaly detection. [8+8]

7. (a) \Gaining control over the Routing tables at layer 3 is one of the attacks” – explain how Route tables modification is crucial.
(b) Explain how Buffer over flow is created for any known platforms (eg., WINDOWS NT / LINUX). [8+8]

8. (a) When tunnel mode is used, a new outer IP header is constructed. For both IPV4 and IPV6, indicate the relationship of each outer IP header field and each extension header in the outer packet to the corresponding field or extension header of the inner IP packet.

That is, indicate which outer values are derived from inner values and which are constructed independently of the inner values?

(b) IP Sec Architecture document mandates support for two types of key management. What are they? [12+4]

Code No: 07A71204
R07 Set No. 4
1. (a) Explain about the Security Mechanisms.
(b) Explain TCP session hijacking with Packet Blocking. [8+8]
2. (a) What is the purpose of a firewall? Discuss the limitations of firewalls?
(b) What is the significance of audit records in intrusion detection? Explain the various fields of an audit record. [8+8]

3. (a) Explain the procedure involved in RSA public-key encryption algorithm.
(b) Explain what Kerberos is and give its requirements. [8+8]

4. (a) Discuss in detail about network management architecture.
(b) What are the deficiencies of SNMPV1?
(c) Give a brief note of distributed network management. [8+4+4]

5. (a) Explain why AES algorithm is an example of symmetric block cipher algorithm.
(b) Write about Simple Hash functions. [8+8]
6. (a) Discuss the scope of ESP encryption and authentication in both IPV4 and IPV6.
(b) Explain about transport adjacency and transport tunnel bundle. [8+8]

7. Explain how the following threats to web security can be defended by SSL:
(a) Known plaintext dictionary attack
(b) Replay attack
(c) Password sning
(d) SYN flooding. [16]

8. (a) Describe clearly the Public key management in PGP.
(b) Show how the S/MIME certification process is carried out. [8+8]

IV B.Tech I Semester Examinations,December 2011 :
Information Security :
1. (a) Dene a Security attack. Explain in detail about the various types of attacks an Internetwork is vulnerable to.
(b) Write about Man-in-the-middle attacks. [10+6]
2. (a) How is screened host rewall, dual-homed bastion dierent from screened host firewall, single home bastion?
(b) What are the two types of audit records that can be used in intrusion detection? Explain the typical elds of an audit record. [8+8]

3. Write about the following terms related to PGP and S/MIME
:
(a) Radix-64
(b) Session key
(c) Compression
(d) Encryption
(e) Decryption. [16]

4. (a) Explain the Feistel cipher structure.
(b) With a clear diagram explain how Cipher Block Chaining mode is performed. [8+8]
5. (a) Discuss how sequence number eld of Authentication header is used to threat replay attacks?
(b) What is a cookie? ISAKMP mandates that the cookie generation satisfy three basic requirements. What are they? Explain? [8+8]

Leave a Reply

How to add comment : 1) Type your comment below. 2) Type your name. 3) Post comment.

www.pdfquestion.in © 2021

Contact Us   Privacy Policy   SiteMap