Guru Gobind Singh Indraprastha Vishwavidyalaya 2009-5th Sem B.C.A Computer Application Computer Networks Security, ester, End Term -, , - Question Paper
(Please write your Exam Ho// ,Mn.) t.xum Holt N<,
I' ll'TII Sl'MISI FH |H< A| 1)H FMHI.I<-200) _______
Paper Code: BCA311 Subject: Computer Networks Security l
Paper Id-20311 ________________]
Time : 3 Hours Maximum Marks :75
[ Note: 0.1 is compulsory. Attempt one question from each unit. ]
] Attempt any five of the- following: (5x5=25)
What is the need of security in network communk.ilion"
.\jjjHtfhat is S/MIME?
(c) Explain technical deficiencies of Kerberos Version 4 over versions.
JAVhat is digital signature and its types?
Explain various types of viruses
4)/Active vs passive; attack.
v/ UNIT-I
Q2 .(a) Explain RSA public key encryption. In a RSA system the public key of a * aiven user is e-7, n=33. What is the private key of this user? (3+3)
\JJ4f What is cryptanalysis? Explain various type of cryptanalysis with example. (3+3.5)
OR
Q3 (a) What is the need of authentication? Explain vanous authentication functions. (3+3)
(b) Explain Diffie Hellmen Key Exchange. User A and B use Diffic Heilman Key Exchange technique with a common prime q 71 and primitive root a=7. If user A has private key Xa'-'3. What is As public key Ya? (3+3.5)
Q4 \Jj}yiZxpilcrin Oakley Key Determination Protocol. \6)
'Jpf Explain X.509 Authentication Service. Describe the. format of X.5Q9 ;*
Certificates. (3+3.5)
OR
QS (a) Explain features of Pretty Good Privacy (PGP), which has made it popular in Electronic Mail Security
fty- Ptaeuag-Kc.i'beit?s"V4--dialog along with The significance of each field in the
message and use of authentication server. (6.5)
y. UNIT-III
Q6< JaLWhat is Secure Electronic Transaction? Explain key features of Secure
Electroni c Tran sa ilion. (3+3)
Explain transport mode and tunnel mode in IP Security. (6.5)
OR
(a) Explain Secure Socket Layer Architecture. (6)
(b) What is dual signature and its usage in Web Security? (6-5)
UNIT IV
(a) What is the relationship among SNMPvl, SNMPv2 and SNMPv3? (6)
(F>) What is an Intruder? Explain various approaches of intrusion detection. (3+3..5)
OR
\(j/f Explain the key elements of Network Management Architecture in SNMP. Explain the SNMPv 1 concept of community. (3+3)
(b) What is firewall? Explain various techniques that firewall use to control access and enforce the security policy. (3+3.5)
Attachment: |
Earning: Approval pending. |