ME – 069

*ME069*

II Semester M.E. (CSE/IT/CN) Degree Examination, June/July 2015 (2K13 Scheme) CN 22 : NETWORK SECURITY Time : 3 Hours

Max. Marks : 100

Instruction : Answer any five complete questions. 1. a) Explain security services defined by X.800 that ensures adequate security of the systems or data transfer.

10

b) List and briefly define categories of passive and active security attacks. Justify which attack is more damaging.

10

2. a) Mention various Cipher block modes of operation. Explain with a block diagram any two methods.

10

b) Explain the various transformations in each round of an Advanced Encryption Standard (AES) Algorithm with a neat diagram. 10 3. a) Using RSA algorithm with A = 1, B = 2 ... Encrypt and Decrypt the text ALGOL for given data p = 13, q = 31 and d = 7. b) What are stream Ciphers ? Explain RC4 Algorithm with a neat diagram. 4. a) What are digital signatures ? Explain its requirements and categories.

10 10 10

b) Mention the various ways in which public key can be distributed. Explain public key certificate.

5

c) Write a note on one way hash function.

5

5. a) What are Kerberos ? Explain the overview of the Kerberos version 4 with Authentication Dialogue.

10

b) What are the key features of X.509 certificate ? How are they issued and revoked by the certificate authority ?

10

6. a) Discuss different counter measures to preventive DOS and Reactive DOS. 10 b) Explain Grid management and Trust management solutions.

10

7. a) Mention the various routing attacks and its solutions. Discuss.

10

b) List and discuss various Grid Authorization Systems. 8. a) Explain Wired Equivalent Privacy (WEP) decryption scripts. b) Explain the various IEEE 802.11 management frame types. –––––––––––––––

10 10 10

NETWORK TECHNOLOGY.pdf

There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. NETWORK ...

29KB Sizes 8 Downloads 154 Views

Recommend Documents

Evolving network structure of academic institutions - Applied Network ...
a temporal multiplex network describing the interactions between different .... texts such as groups of friends in social networks and similar species in food webs ( ...

EU Innovation Network - Core profile within the network - European ...
1. EU Innovation Network Membership. Pre-Adoption of mandate Sept. 2016 ... The EU Innovation offices Network focuses on ... The services of the Innovation.

Global Network for Progress, Inc. Global Network for ... -
Brooklyn & Queens: Grand Central East which becomes Northern State Parkway. Take Exit 32 to Westbury. Proceed through 4 lights. Make a left on Scally Pl ...

network client gateway content creator content provider network admin ...
content creator content provider network admin claimant advertiser seek peers connect to peers redistribute content to peers receive content request from media client request resource media client reassemble file cache file broadcast admin request re

Network Coding, Algebraic Coding, and Network Error Correction
Abstract— This paper discusses the relation between network coding, (classical) algebraic coding, and net- work error correction. In the first part, we clarify.

Network Embedded Support for Sensor Network Security
May 5, 2006 - multicast region that uses a common key for communications. Multicast ...... Reliance on limited, non-renewable battery energy resources.

Evolving network structure of academic institutions - Applied Network ...
differ from the typical science vs humanities separation that one might expect – instead ... Next, for each graduating year we identify all students that earned a degree ..... centrality of chemistry, computer science, engineering, mathematics, and

Define computer network. Computer network is a ...
Reed Solomon code is used to correct burst errors. ➢ The use of error-correcting codes is often referred to as forward error correction. Hamming code. ➢ Hamming codes are code words formed by adding redundant check bits, or parity bits, to a data

Remote Network Labs: An On-Demand Network Cloud ...
Aug 21, 2009 - must configure the peering routers to be in the VPN mode. Whereas in RNL, the router could be set to any configura- tion the users want. Since the users' settings could conflict with the VPN setting, we cannot use VPN as an implemen- t

Evolving network structure of academic institutions - Applied Network ...
texts such as groups of friends in social networks and similar species in food webs (Girvan .... munity membership at least once through the ten years studied.

Network Security
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.

Network Security.pdf
(a) Types of Digital watermarking. (b) Biometrics. (c) Transport Layer Security (TLS). (d) Post Office Protocol 3s (POP3s). (e) Asymmetric Cryptography. 5x2=10.

Energy Network -
Oct 18, 2013 - Next Steps. Sarna / Rachel b. Discussion. All. 5. Other Agenda Items a. Creating Opportunity Summit. Janie McNabb b. MSU –Energy Network ...

Neural Network Toolbox
3 Apple Hill Drive. Natick, MA 01760-2098 ...... Joan Pilgram for her business help, general support, and good cheer. Teri Beale for running the show .... translation of spoken language, customer payment processing systems. Transportation.

Network-Technician.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Network-Technician.pdf. Network-Technician.pdf. Open. Extract.

Network Security.PDF
Project Athena. (b) A is a ... affecting normal system operation. (d) A is a ... MSEI-022. Page 3 of 5. Main menu. Displaying Network Security.PDF. Page 1 of 5.

Serverless Network File Systems
A dissertation submitted in partial satisfaction of the requirements for the degree of. Doctor of Philosophy in. Computer Science in the. GRADUATE DIVISION.

Network Backup.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

network builder .ca
fragmented among thousands of smaller niche sites and blogs. ... Australia. Tel: +61 (0)2 8247 3700. Fax: +61 (0)2 8247 3701. DoubleClick Network Builder ... DoubleClick is a premier provider of digital marketing technology and services.