How To Exam?

a knowledge trading engine...


Guru Gobind Singh Indraprastha Vishwavidyalaya 2009-5th Sem B.C.A Computer Application Computer Networks Security, ester, End Term -, , - Question Paper

Tuesday, 28 May 2013 12:20Web



(Please write your Exam Ho// ,Mn.)    t.xum Holt N<,

End Term Examination

I' ll'TII Sl'MISI FH |H< A| 1)H FMHI.I<-200)    _______

Paper Code: BCA311    Subject: Computer Networks Security l

Paper Id-20311    ________________]

Time : 3 Hours    Maximum Marks :75

[    Note: 0.1 is compulsory. Attempt one question from each unit.    ]


] Attempt any five of the- following:    (5x5=25)

What is the need of security in network communk.ilion"

.\jjjHtfhat is S/MIME?

(c) Explain technical deficiencies of Kerberos Version 4 over versions.

JAVhat is digital signature and its types?

Explain various types of viruses

4)/Active vs passive; attack.

v/ UNIT-I

Q2 .(a) Explain RSA public key encryption. In a RSA system the public key of a *    aiven user is e-7, n=33. What is the private key of this user?    (3+3)

\JJ4f What is cryptanalysis? Explain various type of cryptanalysis with example. (3+3.5)

OR    

Q3 (a) What is the need of authentication? Explain vanous authentication functions.    (3+3)

(b) Explain Diffie Hellmen Key Exchange. User A and B use Diffic Heilman Key Exchange technique with a common prime q 71 and primitive root a=7. If user A has private key Xa'-'3. What is As public key Ya?    (3+3.5)

Q4 \Jj}yiZxpilcrin Oakley Key Determination Protocol.    \6)

'Jpf Explain X.509 Authentication Service. Describe the. format    of X.5Q9 ;*

Certificates.    (3+3.5)

OR

QS (a) Explain features of Pretty Good Privacy (PGP), which has made it popular in Electronic Mail Security

fty- Ptaeuag-Kc.i'beit?s"V4--dialog along with The significance of each    field in the

message and use of authentication server.    (6.5)

y.    UNIT-III

Q6< JaLWhat is Secure Electronic Transaction? Explain key features of Secure

Electroni c Tran sa ilion.    (3+3)

Explain transport mode and tunnel mode in IP Security.    (6.5)


OR

(a) Explain Secure Socket Layer Architecture.    (6)

(b) What is dual signature and its usage in Web Security?    (6-5)

UNIT IV

(a)    What is the relationship among SNMPvl, SNMPv2 and SNMPv3?    (6)

(F>) What is an Intruder? Explain various approaches of intrusion detection. (3+3..5)

OR

\(j/f Explain the key elements of Network Management Architecture in SNMP. Explain the SNMPv 1 concept of community.    (3+3)

(b)    What is firewall? Explain various techniques that firewall use to control access and enforce the security policy.    (3+3.5)








Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Guru Gobind Singh Indraprastha Vishwavidyalaya 2009-5th Sem B.C.A Computer Application Computer Networks Security, ester, End Term -, , - Question Paper