How To Exam?

a knowledge trading engine...


Maharashtra State Board of Technical Education 2009 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper

Saturday, 04 May 2013 12:00Web


Mumbai University
Bachelor of info Technology (B.Sc. IT)
Third year Semester V
Internet Security
CON. -09
(3 Hours) [Total Marks: 100]
April 2009

N.B.

1. Question No.1 is Compulsory.
2. From the remaining (Q Nos. two to 7) attempt any four.
3. Draw neat tagged diagram whenever necessary

Q 1
a)What is Cryptography? discuss Cryptanalysis and role of Cryptanalyst with example. [05]

b)Explain the advantages and disadvantages of Packet Filters. [05]

c)Explain the advantages and disadvantages of Packet Filters. [05]

d)Explain IP Sniffing and IP Spoofing in detail. [05]

e)Write a note on Exponential Attack. [05]


Q 2
a)What is Substitution Cipher Technique? discuss replaced Ceasar Cipher and Polygram Cipher with example.[08]

b)Write a note on Risk Analysis. [06]

c)Write a note on Denial of Service Attack. [06]


Q 3
a)Explain in detail various types of Firewall Configurations. [08]

b)What are WORMS? How do they work? discuss what preventive measures can be taken to avoid WORMS.[06]

c)Explain the concept of 'Social Engineering'. What methods are used by the hackers for this purpose? Also mention the countermeasures. [06]



Q 4
a)State and discuss 4 principles of security with example.[08]

b)What is digital signature? discuss in detail.[06]

c)Distinguish ranging from Traditional Firewall and Distributed Firewall. [06]

Q 5
a)What is stealing password? discuss in detail techniques used for stealing password. elaborate the ways to maintain password? [08]

b)What is Security Policy? State and discuss characteristics of good security policy. [06]

c)Write a note on Filtering TELNET services. [06]





Q 6
a)What is VIRUS? discuss in detail various kinds of viruses.[08]

b)Write a note on BOTNET. [06]

c)Differentiate ranging from active attacks and passive attack. [06]




Q 7
a)Explain Diffie Hellman key exchange algorithm and issue associated with it.[08]

b)What are 'BUGS' and 'BACKDOORS'? What prevention mechanisms can be used for them? [06]

c)Write a note on DYNAMIC FIREWALL. [06]









Mumbai University Bachelor of Information Teehnolojay (B.Sc. IT) Third year Semester V Internet Security Apia 20Q9

CON. -09

(3 Hours)

[Total Marks: 100

N.B.

1.    Question No. 1 is Compulsory.

2.    From the remaining (Q Nos. 2 to 7) attempt any four.

3.    Draw neat labeled diagram whenever necessary

Ql

a)

Wliat is Glyptography? Explain Cryptanalysis and role of Cryptanalyst with example.

05

b)

Explain the advantages and disadvantages of Packet Filters.

05

c)

<0

Explain IP Sniffing and IP Spoofing in detail. Write a note on Exponential Attack.

05

05

Q2

a)

What is Substitution Cipher Teclinique? Explain modified Ceasar Cipher and Polygram Cipher with example.

08

b)

Write a note on Risk Analysis.

06

c)

Write a note on Denial of Senice Attack

06

Q3

a)

Explain in detail different lands of Firewall Configurations.

08

b)

What are WORMS? How do they work? Explain what preventive measures can be taken to avoid WORMS.

06

c)

Explain the concept of 'Social Engineering'. What methods are used by the hackers for tliis puipose? Also mention the countermeasures.

06

Q4

a)

State and explain four principles of security with example.

08

b)

What is digital signature? Explain in detail.

06

c)

Distinguish between Traditional Firewall and Distributed Firewall.

06

Q5

a)

What is stealing password? Explain in detail tecliniques used for stealing password. What are the w'ays to maintain password?

08

b)

c)

What is Security Policy? State and explain characteristics of good security policy.

Write a note on Filtering TELNET services.

06

06

Q6

a)

What is VIRUS? Explain in detail different types of viruses.

08

b)

Write a note on BOTNET.

06

c)

Differentiate between active attacks and passive attack.

06

Q7

a)

Explain Diffie Heilman key exchange algoiitlun and problem associated with it.

08

b)

What are 'BUGS' and 'BACKDOORS'? What prevention mechanisms can be used for them?

06

c)

Write a note on DYNAMIC FIREWALL.

06







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Maharashtra State Board of Technical Education 2009 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper