How To Exam?

a knowledge trading engine...


Maharashtra State Board of Technical Education 2007 B.Sc Information Technology Mumbai university - internet security,,, (IT) - Question Paper

Saturday, 04 May 2013 11:45Web

Mumbai University
Bachelor of info Technology (B.Sc. IT)
Third year Semester V
Internet Security
CON. 4759-07 BS-4563
(3 Hours) [Total Marks: 100]
2007

Important note:
1. Question No.1 is Compulsory.
2. From the remaining (Q Nos. two to 7) attempt any four.
3. Draw neat tagged diagram whenever necessary


Q.1)
a.)Why do we need security? explain. [marks 5]

b.)Write note on Incident Handling. [marks 5]

c.)What are the various kinds of viruses? [marks 5]

d.)Explain the general working of Digital Signatures.[marks 5]


Q.2)
a.)What is security policy? discuss the characteristics of security policy. [marks 8]

b.)Why do we need firewall? explain the different kinds of firewalls. [marks 8]

c.)Write a note on Social Engineering. [marks 4]


Q.3)
a.)Write the Difffie-Hellmen key Exchange algorithm and discuss it in brief. Alex and Bob want to establish a secret key using this algorithm. Given: n=11, x=2, y=3. obtain the value of secret key (K1 and K2) [marks 8]

b.)What are the various ways of sniffing the password? How password sniffing can be avoided
[marks 8]

c.)Write a note on Digging of Worms. [marks 4]

Q.4)
a.)Write any 1 Asymmetric Cryptographic algorithm and discuss its performance with suitable example. [marks 8]

b.)Explain the concept of filtering by service with respect to TELNET. [marks 8]

c.)Write note on DOS attack. [marks 4]


Q.5)
a.)Define message digest. Write any 1 message digest algorithm. [marks 8]

b.)State and discuss different kinds of security models. [marks 8]

c.)Write a note on info Leakage. [marks 4]


Q.6)
a.)How do worms and other viruses spread? How to protect the computer from viruses and worms.
[marks 8]

b.)What are bugs and backdoor? What prevention mechanism can be used for them?[marks 8]

c.)Write short note on Botnets.[marks 4]


Q.7)
a.)State the differences ranging from Traditional Firewall and Distributed Firewall?[marks 8]

b.)What is proxy server? It is observed that the "Default Deny" stance is much safer to implement on a proxy server rather than "Default Permit". Them why do managers and users still prefer to implement the "Default Permit" stance. discuss with reasons.[marks 8]

c.)What are the principles of security?[marks 4]







( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Maharashtra State Board of Technical Education 2007 B.Sc Information Technology Mumbai university - internet security,,, (IT) - Question Paper