2
SASURIE ACADEMY OF ENGINEERING NH-209, Sathy Main Road, Kariyampalayam (PO) Coimbatore-641 653 DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING MODEL EXAMINATION NETWORK SECURITY Class/Sec: IV ECE-A &B Semester: VIII Date: 27.03.13 Time: 3Hours Faculty In-Charge: B.Gowsalya MaxMarks: 100 Part – A (10 * 2 = 20 Marks) Answer all the Questions: 1. With a figure show how is authentication and confidentiality done in PGP. 2. What parameters define the session state of SSL? 3. What is proactive password checker? 4. What is Digital Signature? 5. What are the common techniques used to protect a password file? 6. What are the security options does PGP allow when sending an email message? 7. How is a worm different from a virus? And state what a macro virus is? 8. What is Circuit level gateway? 9. What are the threats associated with a direct Digital Signature scheme? 10. What is meant by polymorphic viruses? Part – B (5* 16 = 80 Marks) Answer all questions 11. (a). (i) Explain the processing of a message block of 512 bits using SHA 1. (12)

Model Exam -i Ns (IV Ece a&b)

Embed Size (px)

Citation preview

Page 1: Model Exam -i Ns (IV Ece a&b)

SASURIE ACADEMY OF ENGINEERING NH-209, Sathy Main Road, Kariyampalayam (PO)

Coimbatore-641 653

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

MODEL EXAMINATION

NETWORK SECURITY

Class/Sec: IV ECE-A &B Semester: VIIIDate: 27.03.13 Time: 3HoursFaculty In-Charge: B.Gowsalya MaxMarks: 100

Part – A (10 * 2 = 20 Marks)Answer all the Questions:1. With a figure show how is authentication and confidentiality done in PGP.2. What parameters define the session state of SSL?3. What is proactive password checker?4. What is Digital Signature?5. What are the common techniques used to protect a password file?6. What are the security options does PGP allow when sending an email message?7. How is a worm different from a virus? And state what a macro virus is?8. What is Circuit level gateway?9. What are the threats associated with a direct Digital Signature scheme?10. What is meant by polymorphic viruses?

Part – B (5* 16 = 80 Marks) Answer all questions

11. (a). (i) Explain the processing of a message block of 512 bits using SHA 1. (12) (ii) Write about the symmetric encryption approach for digital signatures. (4)

OR (b). How does SSL provide Web Security in Web commence? Explain in detail. (16)12. (a). Discuss about (i) UNIX password management. (8)

(ii) Trusted system. (8) OR (b). Discuss viruses and threats in detail. (16)

13. (a).What are the limitations of Firewall? (i) Is firewall the ultimate solution? How can this be cracked? (8)

(ii) How is a firewall designed? (8) OR (b).Discuss briefly about s/MIME. (16)

Page 2: Model Exam -i Ns (IV Ece a&b)

14. (a) (i) How do you provide Electronic Mail Security? (ii) What are known as cookies, honey pots and sniffer dogs? In which part of the network

are they placed? (16) OR

(b). (i) what are the functions included in MIME in order to enhance security? How are they done? (8)

(ii) Why does PGP maintain key rings with every user? Explain how the messages are generated and received by PGP? (8)15. (a). (i) Describe the familiar types of firewall configurations. (10) (8)

(ii) Suggest any three password selection strategies and identify their advantages and disadvantages if any. (6) OR (b). (i) Define intrusion detection and the different types of detection mechanisms in detail. (10) (ii) Write short notes on IP security. (6)