0% found this document useful (0 votes)
24 views14 pages

Ilovepdf Merged

AN -6- I

Uploaded by

yuvraj120555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views14 pages

Ilovepdf Merged

AN -6- I

Uploaded by

yuvraj120555
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

22232

22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.

Marks

1. Attempt any FIVE of the following : 10

(a) Compare virus and logic bomb. (any two points).

(b) Identify any four individual user responsibilities in computer security.

(c) Define following terms :

(i) Cryptography

(ii) Cryptology

(d) Construct digital signature using cryptool.

(e) List any two types of active and passive attacks.

(f) State any two policies of the firewall.

(g) List any four types of cybercrimes.

2. Attempt any THREE of the following : 12

(a) Describe CIA model with suitable diagram.

[1 of 4] P.T.O.
22620 [2 of 4]
(b) Define following with suitable example :

(i) DAC

(ii) MAC

(c) Differentiate between symmetric and asymmetric key cryptography. (any four
points)

(d) Explain steganography technique with suitable example.

3. Attempt any THREE of the following : 12

(a) Describe piggy backing and shoulder surfing.

(b) Convert plain text into cipher text by using Simple columner technique of the
following sentence :

“Maharastra State Board of Technical Education”

(c) State any four difference between Firewall and Intrusion Detection System.

(d) Describe any four password selection criteria.

4. Attempt any THREE of the following : 12

(a) Convert the given plain text, encrypt it with the help of Caesor’s cipher
technique.

“Network and Information Security”.

(b) Demonstrate configuration of Firewall setting windows operating system.

(c) Describe DMZ with suitable diagram.

(d) Describe PGP with suitable diagram.

(e) Find the output of the initial permutation box when the input is given in
hexadecimal as

0  0003 0000 0000 0001


22620 [3 of 4]

5. Attempt any TWO of the following : 12

(a) Describe the following terms :

(i) Assels

(ii) Vulnerability

(iii) Risks

(b) Describe network based IDS with suitable diagram.

(c) Describe COBIT framework with neat diagram.

6. Attempt any TWO of the following : 12

(a) Describe any three phases of virus with suitable example.

(b) Describe ‘Kerberos’ protocol with suitable diagram.

(c) Describe following terms :

(i) Packet filter Firewall

(ii) Application gateway

(iii) Circuit gateway

_______________

P.T.O.
22620 [4 of 4]
23124
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic Communication
devices are not permissible in Examination Hall.

Marks
1. Attempt any FIVE of the following : 10
(a) List any four virus categories.
(b) List any four biometric mechanisms.
(c) Define the following terms :
(i) Cryptography
(ii) Cryptanalysis
(d) Give examples of Active & Passive Attacks (two each).
(e) State the two types of firewall with its use.
(f) List two protocols in IP Sec. State its function.
(g) Classify the following cyber crime :
(i) Cyber terrorism against a government organization
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment

[1 of 4] P.T.O.
22620 [2 of 4]
2. Attempt any THREE of the following : 12
(a) Explain basic principles of information security.
(b) Explain any two password attacks.
(c) Describe digital signature technique using message digest.
(d) Explain steganography technique with an example.

3. Attempt any THREE of the following : 12


(a) Describe :
(i) Piggybacking
(ii) Dumpster diving
(b) Consider plain text “CERTIFICATE” and convert it into cipher text using
Caesar Cipher with a shift of position 4. Write steps for encryption.
(c) State the use of packet filters. Explain its operation.
(d) State the features of (i) DAC (ii) MAC.

4. Attempt any THREE of the following : 12


(a) Convert the given plain text into cipher text using simple columnar technique
using the following data :
 Plain text : NETWORK SECURITY
 Number columns : 06
 Encryption key : 632514
(b) State the working principle of application gateways. Describe circuit gateway
operation.
(c) Describe DMZ with an example.
(d) State the use of Digital Certificates. Describe the steps for digital certificate
creation.
(e) Considering DES, find the output of the initial permutation box when the
input is given in hexadecimal as, 0×0000 0080 0000 0002
22620 [3 of 4]
5. Attempt any TWO of the following : 12
(a) State the criteria for information classification. Explain information
classification.
(b) State the features of the following IDS :
(i) Network based IDS
(ii) Host based IDS
(iii) Honey pots
(c) Explain step-by-step procedure of Kerberos with diagrams.

6. Attempt any TWO of the following : 12


(a) Explain the following attacks using an example :
(i) Sniffing (ii) Spoofing (iii) Phishing
(b) Describe ITIL framework with different stages of life cycle.
(c) State and explain 3 types of firewall configurations with a neat diagram.
_______________

P.T.O.
22620 [4 of 4]
23242
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.

Marks

1. Attempt any FIVE of the following : 10

(a) Differentiate between viruses & worms.

(b) State any four advantages of Biometrics.


(c) Explain the term cryptanalysis.
(d) Define term cyber crime.
(e) Explain the term assets.
(f) State any four limitations of firewall.
(g) Explain working of Kerberos in short.

2. Attempt any THREE of the following : 12


(a) Enlist types of Biometrics & explain any one Biometrics type in detail.
(b) Explain DOS with neat diagram.
(c) Differentiate between symmetric and asymmetric cryptography.
(d) Illustrate digital signature and explain it with neat diagram.

[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Define the following terms :
(i) Authentication
(ii) Authorization
(b) Convert plain text into cipher text by using simple columnar technique of the
following sentence :
ALL IS WELL FOR YOUR EXAM.
(c) Describe packet filter router firewall with neat diagram.
(d) Explain working of fingerprint mechanism and its limitations.

4. Attempt any THREE of the following : 12


(a) Explain Caesar’s cipher substitution technique with example.
(b) Describe host based IDS with its advantages and disadvantages.
(c) Define Hacking. Explain different types of Hackers.
(d) Explain the features of IDS technique.
(e) Differentiate between substitution and transposition techniques ?

5. Attempt any TWO of the following : 12


(a) Explain active attack and passive attack with suitable example.
(b) Describe the DMZ with suitable example.
(c) Explain working principle of SMTP in detail.

6. Attempt any TWO of the following : 12


(a) Explain any three criteria for classification of information.
(b) Describe COBIT framework with neat sketch.
(c) Explain policies, configuration & limitations of firewall in detail.

_______________
12425
22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic Communication
devices are not permissible in Examination Hall.

Marks

1. Attempt any FIVE of the following : 10

(a) Define CIA model of Security Basic.

(b) Enlist the types of Firewalls.


(c) Differentiate between Virus & Worm (any two).
(d) Explain the term Cryptography.
(e) Define the term Honeypots.
(f) Enlist two Intrusion Detection System.
(g) Enlist two Active & Passive attack each.

2. Attempt any THREE of the following : 12


(a) Explain criterias for information classification.
(b) Describe the dumster diving with its prevention mechanism.

[1 of 4] P.T.O.
22620 [2 of 4]
(c) Draw and explain Host-Based intrusion detection system.

(d) Explain Data Encryption Standard.

3. Attempt any THREE of the following : 12

(a) Define following terms :

(i) Operating system security

(ii) Hot fix

(iii) Patch

(iv) Service Pack

(b) Define password selection strategies.

(c) Explain Caesar’s Cipher substitute technique with suitable example.

(d) Explain Email Security in SMTP.

4. Attempt any THREE of the following : 12

(a) Differentiate between Symmetric and Asymmetric key cryptography.

(b) Draw and explain DMZ.

(c) Describe cyber crime and cyber laws in detail.

(d) Write a brief note on Firewall configuration and state its limitations.

(e) Draw and explain network-based intrusion detection system.

5. Attempt any TWO of the following : 12

(a) Draw and explain DOS & DDOS attack in detail.

(b) Write short note on :

(i) Digital signature

(ii) Steganography

(c) Explain Kerberos with the help of suitable diagram.


22620 [3 of 4]
6. Attempt any TWO of the following : 12

(a) Describe following terms w.r.t. biometric :

(i) Finger Print Analysis

(ii) Retina Scan

(iii) Keystroke

(b) Draw and explain following terms :

(i) Packet Filter Firewall

(ii) Proxy Server

(c) Explain following terms of intellectual property right :

(i) Copyright

(ii) Patent

(iii) Trademark

_______________

P.T.O.
22620 [4 of 4]

You might also like