For More Question Papers Visit - www.pediawikiblog.com lOCSlIS835

us

r-

Eighth Semester B.E. Degree Examination, Dec.2017/Jan.2018 j\lnformation and Network Security, J

. Max. Marks: 100 ote: Answer any FIVE full questions, selecting

.• ~

(>

at/east TWO questions from each part. V

ik

1

PART-A <~/

1

a. b.

i

Time: 3 hrs.

Describe an EISP and its components. Define policy and explain iss ie specific security policy.

(10 Marks)

V

!A

r

(10 Marks)

2

a. b.

w

.)

What is firewall? Explain the dual homed host firewall. (10 Marks) Define virtual private network Explain different te hniques to implement a virtual private network. (10 Marks) 0 1/

4

/

a. b.

Describe network based intrusion detection and prevention system. Explain the different types ofIDP systems detection methods.

(10 Marks)

a. b.

Define cipher method. Explain vefll! rrr crpher method with example. Discuss different categories of attack on crypto y terns,

(10 Marks)

d

3

A('

ia

,,/;'

(10 Marks)

(lOMar~

a. b.

Discuss the security ervices. (10 Briefly discuss the difference between Kerberos version 4 and K6rberos version 5. (10

.p

5

e

PART-B

.I

a. b. c.

,

With a neat diagran , explain authentication Explain S/MlME ontent types. Describe Sf.MtME functionality.

and confidentiality

ofP0P.

ww

6

7

a. b. c.

w

c

~

o 0-

E

8

a. b. c.

(10 Marks) (05 Marks) (05 Marks)

Explain the architecture of the IPSec and discuss the role of security associations. (10 With neat diagram, explain IPSec ESP formant. ~ /(I)S ,(05 Mention the important features of Oakley algorithm.

Marks) Marks) ~arks)

(

o

s z

Marks) Marks)

Discuss the SSL protocol stack. Explain key features of SET. Describe the components of SET, with diagram.

*****

For More Question Papers Visit - www.pediawikiblog.com

(05 Marks) (05 Marks) (10 Marks)

Information & Network Security Jan 2018 (2010 Scheme).pdf ...

Mention the important features of Oakley algorithm. ,(05 ~arks). (. 8 a. Discuss the SSL protocol stack. b. Explain key features of SET. c. Describe the components ...

615KB Sizes 2 Downloads 170 Views

Recommend Documents

Computer Communication Network Jan 2017 (2010 Scheme).pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Computer ...

Design of Steel Structures Jan 2018 (2010 Scheme).pdf ...
25kN/m in addition to a concentrated load of 75kt over a clear span of 9.7m, base plate. 300mm. Available rolled se\:tion [email protected]/m. The beam is ...

Discrete Mathematical Jan 2018 (2010 Scheme).pdf
For the Poset shown in the following Hasse diagram, find i) all upper bounds ii) all. lower bounds iii) L uBand GLB of.the set A, where A = {6, 7, 10). (06 Marks).

Hydrology Jan 2018 (2010 Scheme).pdf
index iii) AET and PET iv) Infiltrometer and Lysimeter. (08 Marks). b. What are the measures taken to reduce the e aporation? (06 Marks). c. A twelve hour storm ...

Graph Theory Jan 2018 (2010 Scheme).pdf
the graph and its dual. Fig.Q2(b) (06 Marks). c. Find the chromatic polynomial and chromatic number for the graph shown in Fig.Q2(c). bFig.Q2(c) (OSMarks).

Data Communication Jan 2018 (2010 Scheme).pdf
Digital Communication I. Time: 3 hrs. Max. ... (2 (4nt) S, (t) = VT cos -y- 0 ~ t s T ... Displaying Data Communication Jan 2018 (2010 Scheme).pdf. Page 1 of 2.

NIELIT BE5.3-R4 Network Management & Information Security SP-1 ...
NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. Open. Extract.

Information & Network Security July 2016 (2014 Scheme).pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

Network and information security 2013.pdf
There was a problem previewing this document. Retrying... Download. Connect more ... Network and information security 2013.pdf. Network and information ...

Mechatronics & Microprocessor Jan 2016 (2010 Scheme).pdf ...
Expiain static and dynamic characteristics of sensors. Explain workirlg principle of Hall effect sensor. Deftne following terms: i) Hysteresis error. ii) Repeatability.

Jan.2018.pdf
Spelling Bee. 22. 23. Early Dismissal ... card. If you need to add someone. you must come into the. office. Inspire Empower ... Displaying Jan.2018.pdf. Page 1 of 1.

Network Security
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

Jan. 2018 Breakfast.pdf
A1ft. forms equation of line. ft only on their gradient. (ii) x y = → = += 0.5 ln 4 3 3 9.928. y = 20 500. M1. A1. correct expression for lny. (iii) Substitutes y and rearrange for 3x. Solve 3x. = 1.150. x = 0.127. M1. M1. A1. Page 3 of 10. Jan. 20

Summer 2010 Information - Boston University
featured on the BSO website in a short film about a piece written ... further my own technique and musicality. My future plans are not completely clear to me, but.