No. of Printed Pages : 4

MSEI-022

P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination I I 1.. 1.. -1.

December, 2014 MSEI-022 : NETWORK SECURITY Maximum Marks : 50

Time : 2 hours Note :

Section A - Answer all the objective type questions. Section B - Answer all the very short answer type questions. Section C - Answer any two questions out of three. Section D - Answer any two questions out of three. SECTION A Attempt all the questions. 5x1=5

1. Write true or false : (a)

The study of how to best implement and integrate cryptography in software applications is itself a distinct field.

(b)

Authentication is the process of verifying the identity of a person.

MSEI-022

1

P.T.O.

(c)

The patenting of software is highly controversial.

(d)

A system where one secret key is shared is called asymmetric cryptography.

(e)

Security implies security provided for the transfer of data between the two communicating end points.

2. Fill in the blanks :

5x1=5

(a)

The operates a certification scheme for ISMS auditors.

(b)

BSI, Certification Europe, DNV, JACO IS, KEMA, KPMG, SGS, STQC, SAI Global Limited are the examples of organizations accredited to grant certification against

(c)

The historian described public-key cryptography as "the most revolutionary new concept in the field since polyalphabetic substitution emerged in the Renaissance."

(d)

creates verifiable and ordered cryptographic link between current and already issued time-stamp tokens.

(e)

is the preliminary act of organizations, enterprises and institutions to protect their valuable information across the network.

MSEI-022

2

SECTION B Attempt all the questions. 3.

Write short notes on the following : (a)

Shannon's Maxim

(b)

Online dispute resolution

(c)

Secure Sockets Layer (SSL)

(d)

Padding methods

(e)

Cipher text

5x2=10

SECTION C Attempt any two out of three short type questions. 4.

How are ICMP messages useful for performing network scans ?

5

5.

Explain the application of digital watermarks.

5

6.

Write the classification of time stamping.

5

MSEI-022

3

P.T.O.

SECTION D Attempt any two out of three long type questions. 2x10=20 7.

8.

9.

"Security policies can be useful in ways that go beyond the immediate protection of assets and policing of behaviour." Do you agree with the statement ? If yes, justify it in detail.

10

"Encryption can maintain the privacy of the message and also protect the integrity and authenticity of the message." Do you agree with the statement ? If yes; justify it in detail.

10

"Cybercrime investigations are time-sensitive." Explain how.

10

MSEI-022

4

1,000

I I 1.. 1.. -1.

Write true or false : 5x1=5. (a) The study of how to best implement and integrate cryptography in software applications is itself a distinct field. (b) Authentication is the process of verifying the identity of a person. MSEI-022. 1. P.T.O.. Page 2. (c) The patenting of software is highly controversial. (d) A system where one secret key ...

27KB Sizes 5 Downloads 724 Views

Recommend Documents

1 \1 i
electrode ?xed to said conductive support; said P channel and N channel driver ... each of said driver FE T s connected at a node to define a series totem pole ...

1 1% i
put voltage Vout is applied to a LOAD 65 (shown as coupled to GND). ... trip, and current balancing incorporated into the DC/DC ..... In the present example,.

1 /23 1 /22 i /1 $000000 ICOMPARATORI i
Apr 22, 2011 - “Subword Parallelism With MAX-2,” by R. Lee, IEEE Micro Aug. 1,. JP. 7-334346 .... cial architecture to facilitate programming, such as the.

1 /23 1 /22 i /1 $000000 ICOMPARATORI i
Apr 22, 2011 - Pat. No. 6,237,084, which is a divisional of application Ser. No. ... of application software that can interactively reproduce vari ous kinds of data, ...

i* 1 - Semantic Scholar
linear-algebra methods, like stabilized bi-conjugate gradient descent .... W . We can use this property to pre-normalize by first defining λi =σ + β W. { }i* 1. +γ L.

I 30 1'? DRAWWORKS
Oct 29, 2001 - a single collar housing that is no longer than a standard drill collar. ... measurements include such data as the Weight imposed on the drill bit ...

i* 1 - Semantic Scholar
labeling for web domains, using label slicing and BiCGStab. Keywords-graph .... the computational costs by the same percentage as the percentage of dropped ...

I '1".. ... .c'
May 20, 2016 - Republic of the Philippines .... Implementing School Waste Management Program. 1 e . ... With adequate space and facilities to be used as.

I J. .1
R. O'Hara and A. Petrick, The IEEE 802.11 HandbookiA Design er's Companion ... Protocol”, Technical Study Report of The Institute of Electronic,. Information and ...... While the Web broWsing CCls could be sent every 200 milli second, or ...

i / i 1 }
Foreign Application Priority Data. Primary .... power detector 40 detects the application of the external ...... ond software results in data based on monitoring the.

I l___§4_/1
analog-to-digital converter may includes a chopper-type comparator receiving the analog image signal and the ramp signal and a capacitor for receiving a start ...

I-1.pdf
La convicción delirante se produce a lo largo de un continuum y a veces puede ... Page 3 of 35. Page 3 of 35. I-1.pdf. I-1.pdf. Open. Extract. Open with. Sign In.

1-I Contents.pdf
Electronic Communications System. ... purposes depends on evaluation of those factors and a power of attorney executed pursuant to ORS ... 1-I Contents.pdf.

Page 1 · " \1'1£101 '1c{I\1'I'1 Jayanthi Natarajan D.O. No.1-34-MOS ...
Jan 5, 2013 - I will be happy to call ... DRM had convened a press conference .... To immediately call a high level meeting with the Railway Officials at the ..... squads (04J have been deployed in the area equipped with mobile phones and.

Page 1 i TFE RELEWNNCE OGC NEWSETTER Volume 1 - 1976 ...
(AI) If a system contains the proposition "2 points dtermine a straight line," must it necessarily contain the theorem "Either 2 points determine a straight line or the moon is made of green cheese'?. No, the latter is not a legitimate theorem contai

1-1 Microeconomia I (EN).pdf
Whoops! There was a problem loading more pages. Retrying... 1-1 Microeconomia I (EN).pdf. 1-1 Microeconomia I (EN).pdf. Open. Extract. Open with. Sign In.

1-1 Historia Eco I (EN).pdf
The Spread of Industrialization: Early Comers. The second industrial revolution. Main characteristics of the industrialization of France, Germany, and the United ...

1. ASFT Vol. I. No 1.pdf
Page 1 of 6. TTASFT Volume I No. 1 November, 2015. 1 Premier Edition. TOWER TALK. AROUND SAN FRANCISCO TOWERS. Sugar Caeni. This is a ...

Page 1 i TFE RELEWNNCE OGC NEWSETTER Volume 1 - 1976 ...
KENNETH W. COLLIER/ The Story of NR and E. WILLIAM TUTHILL PARRY/ ABSTRACT: Entailment: Analytic. Implication ... Belnap, Jr.'s Entailment. The Logic ...

1-1 Matematicas I (EN).pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 1-1 Matematicas ...

1-1 Historia Eco I (EN).pdf
Active participation in the classroom: 10%. Individual oral presentations: 10%. EVALUATION CRITERIA. Page 3 of 8. 1-1 Historia Eco I (EN).pdf. 1-1 Historia Eco ...

1-1 Matematicas I (EN).pdf
A wave of emotion swept over her and her eyes filled. with tears. She saw his face contorted for a moment -. with the extremity of his feeling and his voice -was a. little shaky when he answered. 'It's a terrible thing for me to have married a woman

Irp. 1: TypIVE n. I i Accounts
Jan 26, 2016 - from your good office for the support of the barangay chairpersons who shall work with th:„ principals, Alternative ... c/o Dc ALS - AJMFI. 18 SAN ...