Maharashtra State Board of Technical Education 2009 B.Sc Information Technology Mumbai University,T.Y..(IT) , Internet secuirty - Question Paper
Mumbai University
Bachelor of info Technology (B.Sc. IT)
Third year Semester V
Internet Security
CON. -09
(3 Hours) [Total Marks: 100]
April 2009
N.B.
1. Question No.1 is Compulsory.
2. From the remaining (Q Nos. two to 7) attempt any four.
3. Draw neat tagged diagram whenever necessary
Q 1
a)What is Cryptography? discuss Cryptanalysis and role of Cryptanalyst with example. [05]
b)Explain the advantages and disadvantages of Packet Filters. [05]
c)Explain the advantages and disadvantages of Packet Filters. [05]
d)Explain IP Sniffing and IP Spoofing in detail. [05]
e)Write a note on Exponential Attack. [05]
Q 2
a)What is Substitution Cipher Technique? discuss replaced Ceasar Cipher and Polygram Cipher with example.[08]
b)Write a note on Risk Analysis. [06]
c)Write a note on Denial of Service Attack. [06]
Q 3
a)Explain in detail various types of Firewall Configurations. [08]
b)What are WORMS? How do they work? discuss what preventive measures can be taken to avoid WORMS.[06]
c)Explain the concept of 'Social Engineering'. What methods are used by the hackers for this purpose? Also mention the countermeasures. [06]
Q 4
a)State and discuss 4 principles of security with example.[08]
b)What is digital signature? discuss in detail.[06]
c)Distinguish ranging from Traditional Firewall and Distributed Firewall. [06]
Q 5
a)What is stealing password? discuss in detail techniques used for stealing password. elaborate the ways to maintain password? [08]
b)What is Security Policy? State and discuss characteristics of good security policy. [06]
c)Write a note on Filtering TELNET services. [06]
Q 6
a)What is VIRUS? discuss in detail various kinds of viruses.[08]
b)Write a note on BOTNET. [06]
c)Differentiate ranging from active attacks and passive attack. [06]
Q 7
a)Explain Diffie Hellman key exchange algorithm and issue associated with it.[08]
b)What are 'BUGS' and 'BACKDOORS'? What prevention mechanisms can be used for them? [06]
c)Write a note on DYNAMIC FIREWALL. [06]
Mumbai University Bachelor of Information Teehnolojay (B.Sc. IT) Third year Semester V Internet Security Apia 20Q9
CON. -09 | ||
(3 Hours) |
[Total Marks: 100 |
N.B. |
1. Question No. 1 is Compulsory. 2. From the remaining (Q Nos. 2 to 7) attempt any four. 3. Draw neat labeled diagram whenever necessary | ||
Ql |
a) |
Wliat is Glyptography? Explain Cryptanalysis and role of Cryptanalyst with example. |
05 |
b) |
Explain the advantages and disadvantages of Packet Filters. |
05 | |
c) <0 |
Explain IP Sniffing and IP Spoofing in detail. Write a note on Exponential Attack. |
05 05 | |
Q2 |
a) |
What is Substitution Cipher Teclinique? Explain modified Ceasar Cipher and Polygram Cipher with example. |
08 |
b) |
Write a note on Risk Analysis. |
06 | |
c) |
Write a note on Denial of Senice Attack |
06 | |
Q3 |
a) |
Explain in detail different lands of Firewall Configurations. |
08 |
b) |
What are WORMS? How do they work? Explain what preventive measures can be taken to avoid WORMS. |
06 | |
c) |
Explain the concept of 'Social Engineering'. What methods are used by the hackers for tliis puipose? Also mention the countermeasures. |
06 | |
Q4 |
a) |
State and explain four principles of security with example. |
08 |
b) |
What is digital signature? Explain in detail. |
06 | |
c) |
Distinguish between Traditional Firewall and Distributed Firewall. |
06 | |
Q5 |
a) |
What is stealing password? Explain in detail tecliniques used for stealing password. What are the w'ays to maintain password? |
08 |
b) c) |
What is Security Policy? State and explain characteristics of good security policy. Write a note on Filtering TELNET services. |
06 06 | |
Q6 |
a) |
What is VIRUS? Explain in detail different types of viruses. |
08 |
b) |
Write a note on BOTNET. |
06 | |
c) |
Differentiate between active attacks and passive attack. |
06 | |
Q7 |
a) |
Explain Diffie Heilman key exchange algoiitlun and problem associated with it. |
08 |
b) |
What are 'BUGS' and 'BACKDOORS'? What prevention mechanisms can be used for them? |
06 | |
c) |
Write a note on DYNAMIC FIREWALL. |
06 |
Attachment: |
Earning: Approval pending. |