P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination June, 2012
00834
MSEP022 : NETWORK SECURITY Maximum Marks 50
Time : 2 hours Note :
Section A Section B Section C Section D -
Answer all the objective type questions. Answer all the very short answer type questions. Answer any two questions out of three. Answer any two questions out of three. SECTION - A
(Attempt all the questions) 1.
1x5=5 Write True or False (a) The Secure Socket Layer (SSL) protocol is used extensively on the web to protect credit card numbers and other sensitive data transmitted between a user's web browser and an Internet web server. (b) (c)
MSEI-022
Authentication is the process of verifying the identity of a subject. A firewall is a barrier to keep destructive forces away from your property. 1
P.T.O.
(d) (e)
2.
A system where one secret key is shared is called asymmetric cryptography. Security implies security provided for the transfer of data between the two communicating end points.
Fill in the blanks : 1x5=5 is a secret - key network (a) authentication service developed at MIT by Project Athena. (b) A is a computer program that can intercept and log traffic passing over a digital network or part of a network. (c) An is designed to identify potential attacks and autonomously execute counter measures to inhibit them, without affecting normal system operation. (d) A is a trapset to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. (e) is preliminary act of organizations, enterprises and institutions to protect their valuable information across the network.
MSEI-022
SECTION - B (Attempt all the questions) 3.
Write short notes on the following (a)
ADC
(b)
Finger Printing
(c)
Secure Sockets Layer (SSL)
(d)
ESP
(e)
Encryption
MSEI-022
5x2=10
4.
SECTION - C (Attempt 2 out of 3 short type questions) Explain common forms of 'Denial of Service Attacks'.
5
5
5.
Explain the application of digital watermarks.
6.
What is network security ? Explain with the 5 help of example.
MSEI-022
4
P.T.O.
SECTION - D (Attempt 2 out of 3 long type questions) 7.
Explain the different types of security threats ?
10
8.
Explain the different kinds of security mechanisms ?
Project Athena. (b) A is a ... affecting normal system operation. (d) A is a ... MSEI-022. Page 3 of 5. Main menu. Displaying Network Security.PDF. Page 1 of 5.
a temporal multiplex network describing the interactions between different .... texts such as groups of friends in social networks and similar species in food webs ( ...
1. EU Innovation Network Membership. Pre-Adoption of mandate Sept. 2016 ... The EU Innovation offices Network focuses on ... The services of the Innovation.
Brooklyn & Queens: Grand Central East which becomes Northern State Parkway. Take Exit 32 to Westbury. Proceed through 4 lights. Make a left on Scally Pl ...
Abstractâ This paper discusses the relation between network coding, (classical) algebraic coding, and net- work error correction. In the first part, we clarify.
May 5, 2006 - multicast region that uses a common key for communications. Multicast ...... Reliance on limited, non-renewable battery energy resources.
differ from the typical science vs humanities separation that one might expect â instead ... Next, for each graduating year we identify all students that earned a degree ..... centrality of chemistry, computer science, engineering, mathematics, and
Reed Solomon code is used to correct burst errors. ⢠The use of error-correcting codes is often referred to as forward error correction. Hamming code. ⢠Hamming codes are code words formed by adding redundant check bits, or parity bits, to a data
Aug 21, 2009 - must configure the peering routers to be in the VPN mode. Whereas in RNL, the router could be set to any configura- tion the users want. Since the users' settings could conflict with the VPN setting, we cannot use VPN as an implemen- t
texts such as groups of friends in social networks and similar species in food webs (Girvan .... munity membership at least once through the ten years studied.
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. NETWORK ...
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.
Oct 18, 2013 - Next Steps. Sarna / Rachel b. Discussion. All. 5. Other Agenda Items a. Creating Opportunity Summit. Janie McNabb b. MSU âEnergy Network ...
3 Apple Hill Drive. Natick, MA 01760-2098 ...... Joan Pilgram for her business help, general support, and good cheer. Teri Beale for running the show .... translation of spoken language, customer payment processing systems. Transportation.
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Network-Technician.pdf. Network-Technician.pdf. Open. Extract.
A dissertation submitted in partial satisfaction of the requirements for the degree of. Doctor of Philosophy in. Computer Science in the. GRADUATE DIVISION.
fragmented among thousands of smaller niche sites and blogs. ... Australia. Tel: +61 (0)2 8247 3700. Fax: +61 (0)2 8247 3701. DoubleClick Network Builder ... DoubleClick is a premier provider of digital marketing technology and services.