How To Exam?

a knowledge trading engine...


DOEACC Society 2006 DOEACC B Level B5.3 Network Management & Information Security ( ) - Question Paper

Friday, 14 June 2013 04:35Web

B5.3-R3: NETWORK MANAGEMENT & info SECURITY
NOTE:
Time: three Hours Total Marks: 100
1.
a) elaborate the unicast and multicast packets? By examining the addresses used,
determine whether the packet is multicast or unicast.
b) How IPSec can be used to create a VPN?
c) How does 2 filtering routers make the screened subnet firewall most secure?
d) What basic arithmetical and logical functions are used in MD5 and SHA-1?
e) elaborate the Denial of Service attacks?
f) How is ASN.1 various from other data structure definition schemes?
g) elaborate main services given by Computer security incident response teams?
(7x4)
2.
a) What protocol is used at the transport layer? discuss briefly the 3 functional areas of
IP level security.
b) Why does Encapsulating Security Payload (ESP) include a padding field?
c) What is the difference ranging from passive and active attacks with respect to security
threats faced in using the web?
(6+6+6)
3.
a) elaborate the basic techniques that are used by firewalls to control access and enforce
the site’s security policy?
b) Which kind of firewall does act as a relay of application level traffic? Explain, how it is
better from other kinds of firewalls.
(12+6)
4.
a) Differentiate ranging from both the MD5 and SHA-1 algorithms.
b) Suppose that A has a data file namely “d” that B needs. A and B want to ensure a
secure transmission of file. They do not want that anyone should know the content of
file even if it is intercepted during transmission. B also wants to know whether or not
whatever is transmitted from A has not been corrupted or altered in transit and that the
file was sent by A. It is presumed that A and B share a secret symmetric key that no one
else knows and there is a public key infrastructure available.
define the steps that A takes to send the data file “d” meeting the requirements provide
as above. Your solution should only use as few a number of symmetric and/or public
key as necessary while meeting the above requirements.
(6+12)
5.
a) elaborate a few of the attacks that can be made on packet filtering routers and their
improper counter measures?
b) elaborate the procedures involved in Quantitative Risk Assessment? How is the
Annualized Loss Expectancy (ALE) calculated?
(12+6)
B5.3-R3 Page one of two July, 2006
1. ans ques. one and any 4 ques. from two to 7.
2. Parts of the identical ques. should be answered together and in the identical
sequence.
6.
a) What was the security issue current in SNMP V1 that was solved in SNMP v3 and
how?
b) elaborate 2 most popular active contents used as tools by attackers? define them
briefly.
(12+6)
7.
a) What is a “smurf attack” and how is it defended?
b) elaborate the conditions prescribed in IT Act 2000 for the purpose of Electronic
Governance to retain documents, record or info in electronic form for any
specified period?
(12+6)
B5.3-R3 Page two of two July, 2006


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2006 DOEACC B Level B5.3 Network Management & Information Security ( ) - Question Paper