How To Exam?

a knowledge trading engine...


DOEACC Society 2006 DOEACC B Level Network Management & Information Security ( ) - Question Paper

Friday, 14 June 2013 08:00Web

B5.3-R3: NETWORK MANAGEMENT & info SECURITY
NOTE:
Time: three Hours Total Marks: 100
1.
a) What is digital signature? Which algorithms are used for digital signatures?
b) Differentiate ranging from steganography and cryptography.
c) How does message digest help in checking the integrity of a transmitted text?
d) State 4 primary functions of CERT.
e) Differentiate ranging from active and passive attacks on a computer.
f) What is an application level firewall and why is it necessary?
g) State any 4 acts amounting to “cybercrime” as per IT Act 2000.
(7x4)
2.
a) Suppose you are doing RSA encryption with the prime numbers p=13 and q=7. Also,
presume that encryption exponent e=5. obtain the lowest positive decryption exponent d.
Next, encrypt the message m=7. Now decrypt the cipher c=2.
b) discuss the distributed DoS (Denial of Service) attack with a suitable diagram? Why is
this type of attack very common during the final hours of the Internet auction?
c) What is the importance of “no learn up” plus “no write down” rule for a multilevel security
system?
(9+6+3)
3.
a) What is meant by IP spooling? How can a router be used to prevent IP spooling?
b) How does RSA based digital signature help in “non-repudiation”? discuss with a
concrete example scenario ranging from a sender and a receiver.
c) define the Digital Signature (DS) Algorithm based on DS standard of NIST. How are
signing and verifying done in DS standard?
(3+6+9)
4.
a) Consider the subsequent threats to Web security and define how every is countered by a
particular feature of SSL (Secure Sockets Layer):
i) Brute-Force Cryptanalytic Attack
ii) Replay Attack
iii)Packet Sniffing
iv) Password Cracker
v) SYN Flooding
vi) Man-In-The-Middle Attack
b) Name the 6 participants in the SET system and show their interconnections in a secure
electronic commerce component diagram.
([6x2]+6)
B5.3-R3 Page one of two January, 2006
1. ans ques. one and any 4 ques. from two to 7.
2. Parts of the identical ques. should be answered together and in the identical
sequence.
5.
a) In most of the campus/corporate networks, we obtain firewalls preceded by a router, but
not the reverse. Can you discuss why this has become almost a de-facto standard?
b) What is the difference ranging from “reactive” and “proactive” fault management? State the
four steps usually followed in reactive fault management.
c) What does SNMP describe as manager, agent and client? Why does SNMP need SMI and
MIB to manage a network? How are they related to UDP?
(3+6+9)
6.
a) define briefly the Bell-La Padula Model and its limitations. What is tranquility principle
in this model?
b) elaborate the 3 classes of intruders? explain any 3 metrics used in profile-based
anomaly detection. discuss the architecture of a distributed intrusion detection system
(with a suitable diagram) and name the different components.
(8+10)
7. Write short notes on any three:
i) Pretty Good Privacy (PGP)
ii) IPsec VPN
iii) Risk Assessment (RA)
iv) Biometrics
(3x6)
B5.3-R3 Page two of two January, 2006


( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2006 DOEACC B Level Network Management & Information Security ( ) - Question Paper