How To Exam?

a knowledge trading engine...


Maharashtra State Board of Technical Education 2008 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper

Saturday, 04 May 2013 11:55Web


Mumbai University, internet security, October2008,question paper

Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security October 2008

CON. 4836-08

GL-5477

(3 Hours)

[Total Marks: 100

N.B.

1.    Question No. 1 is Compulsory.

2.    From the remaining (Q Nos. 2 to 7) attempt any four.

3.    Draw neat labeled diagram whenever necessary

Q 1

a)

b)

c)

d) e)

Explain the Following un detail-

incident Handling

Digging for worms

Risk Assessment

Digital Envelop

Botnets.

20

Q2

a)

Explain the term security policy. Also enumerate its characteristics and components.

08

b)

Explain the concept of social engineering. What methods do the hackers use for this purpose? Also mention the countermeasures.

06

c)

Write about the concept of filtering by service?

06

Q3

a)

Explain the term Cryptography. Show the different techniques of cryptography. What is firewall? Explain the concept of Distributed Firewall.

08

W

Explain the concept of Protocol Failure. Illustrate your points with three-way-

05

c)

handshake of TCP.

06

Q4

a)

What are the different types of viruses? Give the structure of virus. How will you secure your system from virus attack?

08

b)

Explain the strategies for secure network in detail.

06

c)

What is malicious software? Compare Virus, Worms and Trojan horse.

06

Q5

a)

Explain the term Packet Filter and explain the circuit level filter with SOCKS implementation.

08

b)

Explain any of the symmetric cryptography algorithms in detail.

06

c)

Explain the filtering services forTelnet

06

Q6

a)

What is Message Digest? Explain any message digest algorithm in detail.

08

b)

In order to understand how secure any corporate network is, both inside and outside attacks are required to be purposefully performed on it. Comment and explain your views on this statement with logical reasoning.

06

c)

What is a digital signature? Show its implementation.

06

Q7

a)

b)

c)

d)

Distinguish between the following:-Traditional Firewall and Distributed Firewall Active and Passive attack Symmetric and Asymmetric cryptography Sniffing and Spoofing.

20


Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security Apia 2008

CON

(3 Hours)

[Total Marks: 100

N.B.    1. Question No. 1 is Compulsory.

2. From the remaining (Q Nos. 2 to 7) attempt any four

_3. Draw neat labeled diagram whenever necessary_

Q 1 a) Wliat do you menu by packet spoofing and packet sniffing?    05

b)    Write a note on Incident Handling.    05

c)    What are the components of security policy?    05

d)    Explain what you mean by Plain Text, CipherText> Encryption and Decryption.    05

Q2 a) Enumerate the characteristics and components of a good security policy. 08 b) What are the different types of Viruses? Explain the stiucture of viruses. 08

_c) Discuss in detail the classification of attacks._

Q3 a) State And explain different security models.    08

b) What firewalls can do? What firewall cannot do? Where should we    08

implement the firewall?

_c) Write a note 011 Digging of Worms._04

Q 4 a) Discuss in detail Substitution Cipher and Transposition Cipher.    08

b)    Explain the concept of Social Engineering. What methods are used by the 08 hackers for tliis puipose? Also mention die countermeasures.

c)    Howto protect computer against viruses.    04 Q 5 a) What are various assets that should be protected against security attacks? 08

What are the tlireats against computer security? b) Explain the following terms in detail:    08

(i)    Authentication Failures

(ii)    Protocol Failures.

_How Tro jan horse works? Explain._

Q 6 a) What is difference between symmetric and asymmetric key    08

cryptography? Explain the Diffie-Hellmeii Key Exchange Algoiitlun with an example.

b) What are application gateways? Why are they known as proxy servers? 08 Explain their working in detail. How are they different from circuit gateways?

_Explain Bots and Botnets, their application and misapplication._

Q    Write short notes 011 the following:    20

N    Bugs and Back doors.

a)    *

b)    Digital Signatures.

c)    History of Vims.

_ Key Wrapping._







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Maharashtra State Board of Technical Education 2008 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper