P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination June, 2016 MSEI-022 : NETWORK SECURITY Time : 2 hours
Maximum Marks : 50
(i)
Section - A - Answer all the objective type
Note :
(ii) (iii)
questions. Section - B - Answer all the very short answer type questions. Section - C - Answer any two questions out of three.
(iv)
Section - D - Answer any two questions out of three long type questions. SECTION - A (Attempt all the questions.)
1.
lx5=5 Write true or false : (a) Digital signature require the sender to use the private key. (b) Symmetric encryption is best used for small blocks of data, digital signatures, digital envelopes, and digital certificates. (c) A cipher is a cryptographic system of symbols that represent words or phrases that may be secret but not always confidential.
MSEI-022
1
P.T.O.
(d)
(e)
2.
Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and the same algorithm. Hypertext Transfer Protocol (http) is a means for transmitting and receiving information across the internet. 1x5=5
Fill in the blanks : (a) Full form of CHAP is (b) (c) (d)
(e)
Full form of LDAP is The signal where the watermark is to be embedded is called the A is a trapset to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. A is a s/w or h/w based network security system that controls the incoming and outgoing network traffic based on applied rule-set. SECTION - B (Attempt all the questions.)
3. Write short note on following : (a) Public Key Infrastructure (b) (c)
5x2=10
Steganography
(d)
Distinguish between vulnerabilities, threat and control Risk Analysis
(e)
Session Hijacking
MSEI-022
2
SECTION - C (Attempt 2 out of 3 short type questions.)
4.
Explain, how key distribution is achieved in symmetric key encryption.
5
5.
What is digital signature ? Describe a public key method to create and check digital signatures.
5
6.
What is cryptography ? Define various encryption terms used.
5
SECTION - D (Attempt 2 out of 3 long type questions.)
7.
With the help of neat diagram, briefly explain the 10 types of fire walls
8.
Explain Network Layer Attack. Discuss packnet 10 sniffing in detail.
9.
Describe different types of Intrusion Detection 10 Systems (IDS).
(d) Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and ...
Define various encryption. 5 terms used. SECTION - D. (Attempt 2 out of 3 long type questions.) 7. With the help of neat diagram, briefly explain the 10 types of fire walls. 8. Explain Network Layer Attack. Discuss packnet 10 sniffing in detail. 9. D
Explain the Rabin signature scheme in 5 cryptography. 5. Explain a cryptographic protocol and entity 5 authentication protocol. 6. How does due diligence ensure Compliance of IT 5. Act ? 7. Explain the function of Cyber Appellate Tribunal. 5. SECTION
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).
A leading FMCG manufacturer currently markets its brand of a clothes starch which is in dissolvable powder form. It now plans to launch a spray version of this ...
... questions out of three short answer type questions. Section D â Answer any two questions out of three long answer type questions. SECTION A. Attempt all the following questions. 10x1=10. 1. is one where the suspect operating system is still run
The National Institute of Engineering Science and. 40 ... institute was Civil Engineering College of India, ... Science and Engineering, School of Management.
40 following : (a) Disable the Java Script. (b) Manage passwords through adding exception. (c) Use custom setting for history. (d) Setting fonts and colors in web page. 3. Create a log file and display its contents. Manage exception in firefox and co
(iv) Ghee is obtained from bone. (v) Insulin is produced by pituitary gland. (vi) Submucosa layer of intestine is used as casing. 2. (a) Write about the benefits of utilization of animal by-products. 5 ... setting up a by-product processing plant ? 3
20. What are the different types of Weaker Section. Cooperatives ? Discuss the activities of Tribal. Co-operatives Marketing Development Federation of India Ltd. (TRIFED). 21. Explain the Cooperative Credit Structure in India. 22. Discuss the structu
(a) What is "Training Needs Assessment" ? 10. Discuss tools used for training needs assessment. (b) Examine the sources that could be used for 10 identifying ...
... the types of spatial data. Give suitable examples. 10. 4. Attempt any one part : (a) Discuss topographical maps. With the help of a neat, well-labelled diagram, explain the contour representation of different slopes and landforms on the map. 10.
Part - B : Attempt any five. Each question carries ten marks. Part - C : Attempt any two. Each question carries fifteen marks. PART - A. All questions are ...
religious movement in the text, Iran from Religious. Dispute to Revolution. 7. Critically discuss the main areas of contention 20 between Bronislaw Malinowski's and Annette. Weiner's ethnographic works on the Trobriand. Islanders. 8. Elucidate the ro
POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. O. (PGDLAN). O. Term-End Practical Examination. June, 2016. MLIL-005 : INTERNET RESOURCES. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40. Viva Voce : 10). (Weightage : 40
(b) List and explain types of gender training 10 based on methodology. 3. Define "Empowerment". Discuss various 20 dimensions of empowerment. 4. Analyse the impact of gender training leading to 20 capacity building by using case study of elected wome
MLIL-0061. No. of Printed Pages : 3. POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. (PGDLAN). Term-End Practical Examination. June, 2016. MLIL-006 : CONTENT DEVELOPMENT. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40.