How To Exam?

a knowledge trading engine...


Jawaharlal Nehru Technological University Anantapur 2010-1st Sem B.Tech Code :R7411206 3 IV ester(R07)Regular s, ember/ember INFORMATION SECURITY - Question Paper

Wednesday, 29 May 2013 09:05Web

Code :R7411206 3
IV B.Tech I Semester(R07)Regular Examinations, November/December 2010
info SECURITY
(Information Technology, Computer Science & Systems Engineering)
Time: three hours Max Marks: 80
ans any 5 ques.
All ques. carry equal marks
1. (a) discuss about different security attacks .
(b) Draw and discuss the model for Internetwork security.
2. (a) What is meant by \ Unconditionally Secure " and \ Computationally Secure ".
(b) discuss Sub-key generation in Blow¯sh algorithm.
3. Users A and B use the Di±e-Herrman key exchange technique, a common prime q=71, primitive
root ® =7.
(a) If user A has private key XA = 5, what is A's public key YA.
(b) If user B has private key XB = 12, what is B's public key YB.
(c) What is the shared secret key?
4. Write about Security of RSA algorithm?
5. (a) discuss about encapsulating security payload .
(b) discuss ISAKMP.
6. discuss secure electronic transaction.
7. (a) discuss SNMP VI community facility.
(b) Draw and discuss the architecture for distributed intrusion detection.
8. (a) discuss different kinds of malicious programs.
(b) Write about ¯rewall characteristics.



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Jawaharlal Nehru Technological University Anantapur 2010-1st Sem B.Tech Code :R7411206 3 IV ester(R07)Regular s, ember/ember INFORMATION SECURITY - Question Paper