For More Question Papers Visit - www.pediawikiblog.com lOCSlIS835
us
r-
Eighth Semester B.E. Degree Examination, Dec.2017/Jan.2018 j\lnformation and Network Security, J
. Max. Marks: 100 ote: Answer any FIVE full questions, selecting
.• ~
(>
at/east TWO questions from each part. V
ik
1
PART-A <~/
1
a. b.
i
Time: 3 hrs.
Describe an EISP and its components. Define policy and explain iss ie specific security policy.
(10 Marks)
V
!A
r
(10 Marks)
2
a. b.
w
.)
What is firewall? Explain the dual homed host firewall. (10 Marks) Define virtual private network Explain different te hniques to implement a virtual private network. (10 Marks) 0 1/
4
/
a. b.
Describe network based intrusion detection and prevention system. Explain the different types ofIDP systems detection methods.
(10 Marks)
a. b.
Define cipher method. Explain vefll! rrr crpher method with example. Discuss different categories of attack on crypto y terns,
(10 Marks)
d
3
A('
ia
,,/;'
(10 Marks)
(lOMar~
a. b.
Discuss the security ervices. (10 Briefly discuss the difference between Kerberos version 4 and K6rberos version 5. (10
.p
5
e
PART-B
.I
a. b. c.
,
With a neat diagran , explain authentication Explain S/MlME ontent types. Describe Sf.MtME functionality.
and confidentiality
ofP0P.
ww
6
7
a. b. c.
w
c
~
o 0-
E
8
a. b. c.
(10 Marks) (05 Marks) (05 Marks)
Explain the architecture of the IPSec and discuss the role of security associations. (10 With neat diagram, explain IPSec ESP formant. ~ /(I)S ,(05 Mention the important features of Oakley algorithm.
Marks) Marks) ~arks)
(
o
s z
Marks) Marks)
Discuss the SSL protocol stack. Explain key features of SET. Describe the components of SET, with diagram.
*****
For More Question Papers Visit - www.pediawikiblog.com
Information & Network Security Jan 2018 (2010 Scheme).pdf ...
Mention the important features of Oakley algorithm. ,(05 ~arks). (. 8 a. Discuss the SSL protocol stack. b. Explain key features of SET. c. Describe the components ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Computer ...
25kN/m in addition to a concentrated load of 75kt over a clear span of 9.7m, base plate. 300mm. Available rolled se\:tion [email protected]/m. The beam is ...
For the Poset shown in the following Hasse diagram, find i) all upper bounds ii) all. lower bounds iii) L uBand GLB of.the set A, where A = {6, 7, 10). (06 Marks).
index iii) AET and PET iv) Infiltrometer and Lysimeter. (08 Marks). b. What are the measures taken to reduce the e aporation? (06 Marks). c. A twelve hour storm ...
the graph and its dual. Fig.Q2(b) (06 Marks). c. Find the chromatic polynomial and chromatic number for the graph shown in Fig.Q2(c). bFig.Q2(c) (OSMarks).
Digital Communication I. Time: 3 hrs. Max. ... (2 (4nt) S, (t) = VT cos -y- 0 ~ t s T ... Displaying Data Communication Jan 2018 (2010 Scheme).pdf. Page 1 of 2.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.
There was a problem previewing this document. Retrying... Download. Connect more ... Network and information security 2013.pdf. Network and information ...
Expiain static and dynamic characteristics of sensors. Explain workirlg principle of Hall effect sensor. Deftne following terms: i) Hysteresis error. ii) Repeatability.
Spelling Bee. 22. 23. Early Dismissal ... card. If you need to add someone. you must come into the. office. Inspire Empower ... Displaying Jan.2018.pdf. Page 1 of 1.
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,
A1ft. forms equation of line. ft only on their gradient. (ii) x y = â = += 0.5 ln 4 3 3 9.928. y = 20 500. M1. A1. correct expression for lny. (iii) Substitutes y and rearrange for 3x. Solve 3x. = 1.150. x = 0.127. M1. M1. A1. Page 3 of 10. Jan. 20
featured on the BSO website in a short film about a piece written ... further my own technique and musicality. My future plans are not completely clear to me, but.