0% found this document useful (0 votes)
24 views2 pages

22620

Networking and information security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
24 views2 pages

22620

Networking and information security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
Sample Question Paper: Maharashtra State Board of Technical Education Scheme —I Programme Name: Computer/Information 1 Programme code: CO/F Semester: VI Course Title: Network and Information Security Marks : 70 ‘Time: 3 Hrs. Instructions: (AI questions are compulsory. (2) Illustrate your answers with neat sketches wherever necessary. 3) Figures to the right indicate full marks. (4) Assume suitable data if necessary (5) Preferably, write the answers in sequential order. chnology Engineering Q.1) Attempt any FIVE of the following. (10 Marks) a) List any four basic for security. b) List any four features of DAC. ©) Define following terms i) Cryptography ii) Cryptology 4) Classify following Cybererime i) Cyber terrorism against a government organization ii) Cyber-stalking iii) Copyright Infringement iv) Email harassment ©) Give example of Active and Passive attack (Two Each). 1) State of needs of Firewalls. ) Define AS, TGS with respect to Kerberos. Q.2) Attempt any THREE of the following. (12 Marks) a) Explain criteria’s for information classification b) Define following terms. i) Authentication ii) Authorization ©) Differentiate between symmetric and asymmetric key cryptography. 4) Explain stenography technique with suitable diagram. Q.3) Attempt any THREE of the following. (12 Marks 1a) Describe the working of biometric system with neat sketeh. b) Consider plain text “INFORMATION” and convert given plain text into cipher text using ‘Caesar Cipher’ with shift of position three-write down steps in eneryption. c) Demonstrate the advantages of setting up a DMZ with two firewalls. 4) Describe the dumpster diving with its prevention mechanism, Q.4) Attempt any THREE of the following. (12 Marks) a) Convert the given plain test into cipher text using single columnar technique using following data + Plain Text: INFORMATION SECURITY + Number of Columns: 06 + Encryption Key: 326154 = b) State difference between Firewall and Intrusion Detection System? ©) Describe the host-based intrusion detection system with suitable diagram, 4) Explain working principle of SMTP. ©) Find the output of the initial permutation box when the input is given in hexadecimal as: 0x0002 0000 0000 0001 Q5) Attempt any TWO of the following. (12 Marks) 2) Explain the terms: i) Vulnerability ii) Threats iii) Risks b) Describe the following i) Network based IDS ii) Packet Filter Firewall ©) Describe COBIT framework with neat sketch. Q.6) Attempt any TWO of the following. (12 Marks) a) List Need and Importance of Information? State the Information Classification. b) Describe following terms of intellectual property = i) Copyright ii) Patent ii) Trademark ©) Describe the DMZ with suitable example.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy