How To Exam?

a knowledge trading engine...


Vinayaka Missions University 2010 B.E Information Technology Cryptography and network security - Question Paper

Wednesday, 22 May 2013 07:50Web
5. Differentiate internal and external fault control.
6. Write short notes on hash function.
7. Specify the techniques for distribution of public key.
8. Illustrate denial of service. provide an example.
9. What are the properties of a hash function used in message authentication?
10. Compare SHA-1 and MD5 algorithm.
11. What is meant by message digest?
12. Write the requirements of a hash functions.
13. List out the design objectives for HMAC.
14. Mention the 3 classes of message authentication functions.
15. Why it is a need for mutual authentication protocol?
16. Specify the requirements of digital signature.
17. Write the key requirements of message digests.
18. What is meant by brute force attack?
19. Define birthday attack.
20. Differentiate public key encryption and conventional encryption.
21. Specify the 4 categories of security threats
22. List the kinds of E-mail security.
23. What is web security?
24. Define CMAC.
25. List out the properties of digital signature.

PART B
1. Explain any 1 of approach and algorithm for Digital Signatures.
2. Illustrate with improper diagrams the basic uses of Hash Function.
3. Explain the various kinds of hash functions with illustrations.
4. . discuss simple hash function with example?
5. How hash functions are used in message authentication? explain in detail about a simple hash functions and block chaining techniques.
6. Explain the MD-5 and SHA-1 hashing functions with an example.
7. Explain the digital signature algorithm with example and its application.
8. What are the various kinds of arbitrated digital signatures? discuss their operation and other features.
9. Describe HMAC algorithm.
10. Explain in detail about authentication function.

UNIT IV
PART A

1. Define Kerberos.
2. In the content of Kerberos, what is realm?
3. Assume the client C wants to communicate server S using Kerberos procedure.
How can it be achieved?
4. Write any 3 hash algorithm.
5. What are the services given by PGP services?
6. Why E-mail compatibility function in PGP needed?
7. Name any cryptographic keys used in PGP.
8. Define key Identifier.
9. Write the elements of MIME.
10. What are the headers fields describe in MIME?
11. What are the key algorithms used in S/MIME?
12. Give the steps for preparing envelope data MIME?
13. What you mean by versioned certificate?
14. What are the function areas of IP security?
15. Give the benefits of IP security.
16. Mention the protocols used to give IP security.
17. Specify the IP security services?
18. Define trusted system in your network.
19. How will you generate a key in S/MIME?
20. elaborate the functions included in MIME in order to enhance security?
21. List out the steps involved in SS L needed protocol.
22. How does MIME enhance SMTP?
23. Differentiate Transport and Tunnel mode in IPSec
24. What is mean by SET? elaborate the features of SET?
25. Why the leading 2 octets of message digest are stored in PGP message along with the encrypted message digest?

PART B

1. Why does PGP maintain key rings with every user? discuss how the messages are generated and received by PGP.
2. Draw the diagram of IP security architecture and overview and discuss with neat function points.
3. List the protocol which is used for web security. Differentiate ranging from SSL and TLS with necessary diagrams.
4. Define message encryption. discuss in detail about SSL advantages and disadvantage with architecture diagram.
5. Differentiate ranging from PGP and S/MIME with different functional aspects and diagrams.
6. Discuss in detail Kerberos four message Exchanges for providing authentication
7. Suggest your views regarding authentication requirements and discuss in detail about authentication function.
8. What is Kerberos and list out its applications? discuss how it provides authenticated services.
9. Explain with suitable diagrams how authentication and confidentiality is given in Electronic Mail .
10. With necessary diagrams discuss X.509 authentication service.

UNIT V
PART A

1. Define virus. Specify the kinds of viruses
2. Write the design goals of firewalls.
3. Mention the principle of a packet filtering kind of firewall.
4. List out the limitations of firewall.
5. Write replay attack with an example.
6. What is trusted system? How is it useful?
7. Write the use of trusted system.
8. What is meant by tiny fragment attack? How can it be defeated?
9. Mention the principle of a packet filtering kind of firewall.
10. List out the configuration of firewall.
11. Write a note on intrusion detection.
12. Mention any 2 file protection mechanisms.
13. Define an encrypted tunnel.
14. List and briefly describe 3 classes of intruder.
15. Specify the 2 common techniques used to protect a password file.
16. List out the 4 basic techniques for password selection strategies.
17. What is a honey pot?
18. Outline the kinds of scanning strategies.
19. Mention the typical phases of operation of a virus or worm.
20. How does behavior blocking software works?
21. In general terms how a worm propagate?
22. In the situation of access control, what is the difference ranging from a subject and an object?
23. List 4 techniques used by firewalls to control access and enforce a security policy.
24. Write a note on digital immune system.
25. Name the 4 techniques used by firewall.

PART B

1. Give 1 cause why a firewall might be configured to inspect outgoing traffic. Do you think the inspections are likely to be successful?
2. What do you mean by timestamp? discuss in detail about trusted system and its functions with neat diagrams.
3. Describe with neat diagrams the familiar kinds of firewall configurations.
4. Explain in detail about the different Intrusion Detection mechanisms..
5. State and discuss Password Management and password selection strategies.
6. Write the name of a few Viruses and worms. discuss it.
7. What are the characteristics and capabilities of firewalls? discuss the kinds of firewalls.
8. Explain in detail about internet infrastructure security.
9. Discuss in detail about the concepts of trusted systems and data access control.
10. Explain in detail about prevention of Denial of Service attacks.






( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Vinayaka Missions University 2010 B.E Information Technology Cryptography and network security - Question Paper