You are on page 1of 4

. w ww .

ww w

. w ww . ww w

g .orrCode No: V3225/R07 .orrg Set No. 1 tarrorrg ..og og og tarr. tarr. ta IS IS ta Examinations, April 2010 ndIS ta IS d d d III B.Tech II an d Regular Semester n IS SECURITY ndIS .U INFORMATION .Ua Science & Engineering) ww.Ua .Ua w (Computer w ww w w wMax Marks: 80 ww w Time: 3 hours
Answer any FIVE Questions All Questions carry equal marks

.orrg og tarr. 1. IS ta d IS d
2.

.orrg .orrg og og tarinrdetail about the various types of attacksIStarr. ta . (a) Dene a Security attack. S Explain IISto. ISta d nd an Internetwork isn d a vulnerable attacks. a[10+6] an and U (b) Writew. .U about Man-in-the-middle w.U w w.U w ww the use of S-Boxes in AES algorithm. ww ww (a) w Explain
(b) Dierentiate between DES and AES algorithms. (c) Enumerate the various cipher block modes of operation.

.orrg3. og r ta . Sta r dIIS d

[5+5+6] g g rrdata and explain how encryption .o .orrg o og (a) Perform the RSA algorithm on the . r arr. ta given and decryption are performed on the message: p = 17; q = 31; e = 7; M =2.ISt ta Sta r I d dS ndtheIversion 4 and version 5 of Kerberos inUanthe IS (b) Compare and contrast terms of d n an a a[8+8] . Authentication Dialogue. .U w.U w.U w win detail the Multipurpose Internet Mailwww (MIME). [16] ww 4. Clearly explain Extensions ww w 5. (a) Explain tunnel mode and transport mode functionality? (b) Discuss about Oakley key determination protocol?

..og rrorrg6. a ISta d IS t d


7.

[8+8] g rrg under them? .othe . .o g . rListo alerts rrorrg (a) What are the two levels of alerts? r ta ISta Sta Sa (b) Discuss various web security approaches based on their scope of applicabilityIS d Iwith in the TCP/IP protocol stack? and I t nd and their relative n a location and a[8+8] ..U .U w.U wU (a) Discusswdetail about network management protocol ww in architecture? w w w how SNMPV2 addresses the lack of supportww wfor distributed network (b) w Explain management in SNMPV1? [8+8] (a) What are two default policies that can be taken in a packet lter if there is no match to any rule? Which is more conservative? Explain with example rule sets both the policies?

rrg8. .o g tarr.o IS ta d IS d

.orrg .orrg og og tarr. ta a user operation into elementaryIStarr. IS decomposing S Iof ISta (b) What are the advantages nd and and and actions? U a . w.U [6+6+4] w.U w.U (c) Whatw false negatives and false positives? are ww ww ww ww

.orrg .orrg .orrg og og og tarr. t1ar1r. tarr. ta ta IS purchase PDF Split-Merge on www.verypdf.com to remove this watermark. IS of IS ta IS IS dPlease d d nd nd IS a a d Ua n Ua n .U .U

. w ww . ww w

. w ww . ww w

g .orrCode No: V3225/R07 .orrg Set No. 2 tarrorrg ..og og og tarr. tarr. ta IS IS ta Examinations, April 2010 ndIS ta IS d d d III B.Tech II an d Regular Semester n IS SECURITY ndIS .U INFORMATION .Ua Science & Engineering) ww.Ua .Ua w (Computer w ww w w wMax Marks: 80 ww w Time: 3 hours
Answer any FIVE Questions All Questions carry equal marks

.orrg og tarr. 1. IS ta d IS d
2.

.orrg .orrg og og tarinrdetail about the various types of attacksIStarr. ta . (a) Dene a Security attack. S Explain IISto. ISta d nd an Internetwork isn d a vulnerable attacks. a[10+6] an and U (b) Writew. .U about Man-in-the-middle w.U w w.U w ww and contrast between Cryptography and ww ww (a) w Compare Cryptology.
(b) Explain the various Key distribution methods. [8+8] (a) Explain the structure of the Conventional Public-key encryption with relevant illustrations.

orrg3. ..og r ta Sta r dIIS d


4. 5.

.orrg .orrg og og r arr. ta . (b) Write about the X.509 certication service. [8+8]ISt ta Sta r dII of nformat Sa PGP message with a pictorial representation. IS a d and (a) Explain the generaln a and ..U U w.U [8+8] (b) Whatw Certication Authority and explain its role in S/MIME. is a wU w w w. w w about the documents regarding IPSec protocol? w w w w (a) Discuss
(b) Describe any four ISAKMP payload types listing the parameters of the payload? [8+8]

..og rrorrg6. a ISta d IS t d


7.

g ..org . .o g rrorcondentiality and message integrity tarrorrg (a) Discuss how SSL record protocol provides for SSL connections? IS t Sa Ita IS a d threats faced in using the web? dIS t (b) Summarize thean of types a[10+6] and and U U n . . wU wU (a) Whatw the key elements of SNMP? Explain. w are . ww . ww ww w (b) w a comparison of SNMPV1 and SNMPV2 protocol data units. Make [8+8]

.orrg og tarr. IS ta d IS d

8. (a) What are two default policies that can be taken in a packet lter if there is no match to any rule? Which is more conservative? Explain with example rule sets both the policies?

.orrg .orrg og og arr. arr. (b) What are the advantages of t ta decomposing a user operation into elementary St ta IS actions? ndIS ndIIS ndand false positives? a a nd a (c) What are.U negatives .U .Ua w false w.U [6+6+4] ww w ww w ww ww

.orrg .orrg .orrg og og og tarr. t1ar1r. tarr. ta ta IS purchase PDF Split-Merge on www.verypdf.com to remove this watermark. IS of IS ta IS IS dPlease d d nd nd IS a a d Ua n Ua n .U .U

. w ww . ww w

. w ww . ww w

g .orrCode No: V3225/R07 .orrg Set No. 3 tarrorrg ..og og og tarr. tarr. ta IS IS ta Examinations, April 2010 ndIS ta IS d d d III B.Tech II an d Regular Semester n IS SECURITY ndIS .U INFORMATION .Ua Science & Engineering) ww.Ua .Ua w (Computer w ww w w wMax Marks: 80 ww w Time: 3 hours
Answer any FIVE Questions All Questions carry equal marks

.orrg og tarr. 1. IS ta d IS d
2.

.orrg .orrg og og taexplain its signicance in todays world. AlsoIStarr. t rr. (a) Dene Information Security and a IS of the following related terms: Computernd ISta dIS d clearly bring out the d n meaning Security with relevant examples.a Secua rity, Network Security and Internet Ua n U an w..U hijacking with suitable examples. ww..U [8+8] (b) Write about UDP w w ww w w ww AES cipher versus RC4 encryption algorithm. w (a) Compare
(b) Compare and contrast SHA-1 and HMAC functions. [8+8] (a) Explain the procedure involved in RSA public-key encryption algorithm.

.orrg3. og r ta . Sta r dIIS d 4.

.orrg .orrg og og r. r (b) Explain what Kerberos is and a r requirements. give [8+8] ta . Stta its Sta r dIIS ndIIS (a) What is Radix-64 n d Explain how both PGP and S/MIME perform the format? a n performed. a nd a is Radix-64 .U conversion ..Ua .U principal services that Pretty Good PrivacywU provides. w w (b) Describe the ve w w ww w ww (PGP) [8+8] w w

..og rrorrg a ISta d IS t d

5. (a) When tunnel mode is used, a new outer IP header is constructed. For both IPV4 and IPV6, indicate the relationship of each outer IP header eld and each extension header in the outer packet to the corresponding eld or extension header of the inner IP packet. That is, indicate which outer values are derived from inner values and which are constructed independently of the inner values?

6.

..og . .o g rrorrg rrorrg a ISta ISta Sta dI d ISt n an d an and (b) IP Sec Architecture document mandates support for two typesUkey manof a U are they? . . agement. What wU wU ww . ww . [12+4] w ww w the (a) w protocol is used to convey SSL-related alerts w peer entity? Give What to
the protocol format? Describe the elds? (b) What are the advantages of using IP security to provide web security? How advantageous is application-specic web security services? [10+6]

.orrg7. og tarr. IS ta d IS d
8.

rg .oExplain. .orrg org og tarr. tarr. (a) What are the key elements of SNMP? ta IS and SNMPV2 protocol data units. ndIS ta d IS (b) Make a comparison nd [8+8] nof SNMPV1 ndIS a Ua Ua .diagrams show the dierences between screened w.rewall single .Ua (a) With w neat host .U w homed ww w and screened host rewall dual homedwww ww bastion about multilevel security? wbastion? (b) Discuss in detail [8+8]

.orrg .orrg .orrg og og og tarr. t1ar1r. tarr. ta ta IS purchase PDF Split-Merge on www.verypdf.com to remove this watermark. IS of IS ta IS IS dPlease d d nd nd IS a a d Ua n Ua n .U .U

. w ww . ww w

. w ww . ww w

g .orrCode No: V3225/R07 .orrg Set No. 4 tarrorrg ..og og og tarr. tarr. ta IS IS ta Examinations, April 2010 ndIS ta IS d d d III B.Tech II an d Regular Semester n IS SECURITY ndIS .U INFORMATION .Ua Science & Engineering) ww.Ua .Ua w (Computer w ww w w wMax Marks: 80 ww w Time: 3 hours
Answer any FIVE Questions All Questions carry equal marks

.orrg og tarr. 1. IS ta d IS d

.orrg .orrg og og tGiverr. classication of the Security attacks.IStarr. a (a) What is a Security attack? t the ISin a with relevant examples: ISdetail ISta d Discuss the following terms and and and U U an i. Interruption w..U w..U w w ii. ww w wiii.w ww w Interception Modication
iv. Fabrication (b) Explain UDP hijacking.

.orrg2. og r ta . Sta r dIIS d


3.

orrg Standard algorithm[10+6] arrorrg ..og ..og r (a) With neat illustration explainta r Encryption (AES). taHash S Advanced functions with relevant examples. dIStta IofIS (b) Explain the importance Secure d nd n dIS .Ua n .Ua [8+8] Ua Uan ww . ww . (a) Explain the relationship between Public-key cryptography and the Certicaww w authority. w ww w w tion
(b) Explain about X.509 version 2 Authenticate service. [8+8] (a) Explain the general format of a PGP message with a pictorial representation.

..og 4. rrorrg a ISta d IS t 5. d


6.

rg .oexplain . .o g rand.org its role in S/MIME. [8+8] tarrorrg (b) What is a Certication Authority r Stato Irelateda specic security associations? ndIS ta dis ISt (a) Explain how IP trac d n n replay attack? Explain how inbound processing ndIS a (b) What do .U you mean by .Ua mechanism when a packet is received?w.Ua [8+8] .Ua prowanti - reply ceeds w ww inw ww w w a comparison of threats on the web? ww (a) Make
(b) What is SSL connection? Can a connection be associated with more than one session? What parameters dene connection state? [8+8]

.orrg7. og tarr. IS ta d IS d
8.

g .orrthat do not implement SNMP? tarrorrg . .o g og (a) Explain how proxy accommodates devices tarr. IS ta IS ta IS concepts. (b) Discuss SNMPV1 administrative [8+8] nd nd of screened-subnet rewall system? .Uand IS a a and (a) What are.U advantages wthe.concept of Trusted systems? w .U [6+10] wtheU (b) ww Explain ww ww w ww

.orrg .orrg .orrg og og og tarr. t1ar1r. tarr. ta ta IS purchase PDF Split-Merge on www.verypdf.com to remove this watermark. IS of IS ta IS IS dPlease d d nd nd IS a a d Ua n Ua n .U .U

You might also like