Maharashtra State Board of Technical Education 2008 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper
Mumbai University, internet security, October2008,question paper
Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security October 2008
CON. 4836-08 |
GL-5477 | |
(3 Hours) |
[Total Marks: 100 |
N.B. |
1. Question No. 1 is Compulsory. 2. From the remaining (Q Nos. 2 to 7) attempt any four. 3. Draw neat labeled diagram whenever necessary | ||
Q 1 |
a) b) c) d) e) |
Explain the Following un detail- incident Handling Digging for worms Risk Assessment Digital Envelop Botnets. |
20 |
Q2 |
a) |
Explain the term security policy. Also enumerate its characteristics and components. |
08 |
b) |
Explain the concept of social engineering. What methods do the hackers use for this purpose? Also mention the countermeasures. |
06 | |
c) |
Write about the concept of filtering by service? |
06 | |
Q3 |
a) |
Explain the term Cryptography. Show the different techniques of cryptography. What is firewall? Explain the concept of Distributed Firewall. |
08 |
W |
Explain the concept of Protocol Failure. Illustrate your points with three-way- |
05 | |
c) |
handshake of TCP. |
06 | |
Q4 |
a) |
What are the different types of viruses? Give the structure of virus. How will you secure your system from virus attack? |
08 |
b) |
Explain the strategies for secure network in detail. |
06 | |
c) |
What is malicious software? Compare Virus, Worms and Trojan horse. |
06 | |
Q5 |
a) |
Explain the term Packet Filter and explain the circuit level filter with SOCKS implementation. |
08 |
b) |
Explain any of the symmetric cryptography algorithms in detail. |
06 | |
c) |
Explain the filtering services forTelnet |
06 | |
Q6 |
a) |
What is Message Digest? Explain any message digest algorithm in detail. |
08 |
b) |
In order to understand how secure any corporate network is, both inside and outside attacks are required to be purposefully performed on it. Comment and explain your views on this statement with logical reasoning. |
06 | |
c) |
What is a digital signature? Show its implementation. |
06 | |
Q7 |
a) b) c) d) |
Distinguish between the following:-Traditional Firewall and Distributed Firewall Active and Passive attack Symmetric and Asymmetric cryptography Sniffing and Spoofing. |
20 |
Mumbai University Bachelor of Information Technology (B.Sc. IT) Third year Semester V Internet Security Apia 2008
CON | ||
(3 Hours) |
[Total Marks: 100 |
N.B. 1. Question No. 1 is Compulsory.
2. From the remaining (Q Nos. 2 to 7) attempt any four
_3. Draw neat labeled diagram whenever necessary_
Q 1 a) Wliat do you menu by packet spoofing and packet sniffing? 05
b) Write a note on Incident Handling. 05
c) What are the components of security policy? 05
d) Explain what you mean by Plain Text, CipherText> Encryption and Decryption. 05
Q2 a) Enumerate the characteristics and components of a good security policy. 08 b) What are the different types of Viruses? Explain the stiucture of viruses. 08
_c) Discuss in detail the classification of attacks._
Q3 a) State And explain different security models. 08
b) What firewalls can do? What firewall cannot do? Where should we 08
implement the firewall?
_c) Write a note 011 Digging of Worms._04
Q 4 a) Discuss in detail Substitution Cipher and Transposition Cipher. 08
b) Explain the concept of Social Engineering. What methods are used by the 08 hackers for tliis puipose? Also mention die countermeasures.
c) Howto protect computer against viruses. 04 Q 5 a) What are various assets that should be protected against security attacks? 08
What are the tlireats against computer security? b) Explain the following terms in detail: 08
(i) Authentication Failures
(ii) Protocol Failures.
_How Tro jan horse works? Explain._
Q 6 a) What is difference between symmetric and asymmetric key 08
cryptography? Explain the Diffie-Hellmeii Key Exchange Algoiitlun with an example.
b) What are application gateways? Why are they known as proxy servers? 08 Explain their working in detail. How are they different from circuit gateways?
_Explain Bots and Botnets, their application and misapplication._
Q Write short notes 011 the following: 20
N Bugs and Back doors.
a) *
b) Digital Signatures.
c) History of Vims.
_ Key Wrapping._
Attachment: |
Earning: Approval pending. |