No. of Printed Pages : 3

MSEI-0221

P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination June, 2016 MSEI-022 : NETWORK SECURITY Time : 2 hours

Maximum Marks : 50

(i)

Section - A - Answer all the objective type

Note :

(ii) (iii)

questions. Section - B - Answer all the very short answer type questions. Section - C - Answer any two questions out of three.

(iv)

Section - D - Answer any two questions out of three long type questions. SECTION - A (Attempt all the questions.)

1.

lx5=5 Write true or false : (a) Digital signature require the sender to use the private key. (b) Symmetric encryption is best used for small blocks of data, digital signatures, digital envelopes, and digital certificates. (c) A cipher is a cryptographic system of symbols that represent words or phrases that may be secret but not always confidential.

MSEI-022

1

P.T.O.

(d)

(e)

2.

Collisions are a well-known weakness in cryptography in which plain text messages can generate identical cipher - text messages using different keys and the same algorithm. Hypertext Transfer Protocol (http) is a means for transmitting and receiving information across the internet. 1x5=5

Fill in the blanks : (a) Full form of CHAP is (b) (c) (d)

(e)

Full form of LDAP is The signal where the watermark is to be embedded is called the A is a trapset to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. A is a s/w or h/w based network security system that controls the incoming and outgoing network traffic based on applied rule-set. SECTION - B (Attempt all the questions.)

3. Write short note on following : (a) Public Key Infrastructure (b) (c)

5x2=10

Steganography

(d)

Distinguish between vulnerabilities, threat and control Risk Analysis

(e)

Session Hijacking

MSEI-022

2

SECTION - C (Attempt 2 out of 3 short type questions.)

4.

Explain, how key distribution is achieved in symmetric key encryption.

5

5.

What is digital signature ? Describe a public key method to create and check digital signatures.

5

6.

What is cryptography ? Define various encryption terms used.

5

SECTION - D (Attempt 2 out of 3 long type questions.)

7.

With the help of neat diagram, briefly explain the 10 types of fire walls

8.

Explain Network Layer Attack. Discuss packnet 10 sniffing in detail.

9.

Describe different types of Intrusion Detection 10 Systems (IDS).

MSEI-022

3

(PGDIS) Term-End Examination June, 2016 MSEI-022

Define various encryption. 5 terms used. SECTION - D. (Attempt 2 out of 3 long type questions.) 7. With the help of neat diagram, briefly explain the 10 types of fire walls. 8. Explain Network Layer Attack. Discuss packnet 10 sniffing in detail. 9. Describe different types of Intrusion Detection 10. Systems (IDS). MSEI-022. 3.

32KB Sizes 0 Downloads 73 Views

Recommend Documents

(PGDIS) Term-End Examination June, 2014
POST GRADUATE DIPLOMA IN. INFORMATION SECURITY (PGDIS). Term-End Examination. June, 2014. MSE-024 : POLICY, STANDARDS AND LAWS.

(PGDIS) Term-End Examination O June, 2015 O MSEI-027
provide the most false alarm due to unpredictable behaviors of users and networks ? (a) Network based IDS system (NIDS). (b) Host based IDS system (HIDS).

Term-End Examination June, 2016 OTH-001
O. O. CERTIFICATE IN PERFORMING ARTS -. THEATRE ARTS (CPATHA). Term-End Examination. June, 2016. OTH-001 : AN INTRODUCTION TO THEATRE.

(PGCGI) Term-End Examination 00907 June, 2016 MGY-001
... the types of spatial data. Give suitable examples. 10. 4. Attempt any one part : (a) Discuss topographical maps. With the help of a neat, well-labelled diagram, explain the contour representation of different slopes and landforms on the map. 10.

(PGDLAN) Term-End Practical Examination June, 2016 MLIL-005
POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. O. (PGDLAN). O. Term-End Practical Examination. June, 2016. MLIL-005 : INTERNET RESOURCES. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40. Viva Voce : 10). (Weightage : 40

(PGCGI) Term-End Examination 00907 June, 2016 MGY-001
... the types of spatial data. Give suitable examples. 10. 4. Attempt any one part : (a) Discuss topographical maps. With the help of a neat, well-labelled diagram, explain the contour representation of different slopes and landforms on the map. 10.

(DMT) Term-End Examination June, 2016 BPVI-028
(b) State whether following sentences are True or False (any five) : 1x5=5. (i). A project ... lx5=5. (i). WI 410-f Th* dckilqq. Rntii ti. Ntruri 14* fry #1:fT'eTW 3111 t' I.

Term-End Examination June, 2016 BPVI-028
of pork. (ii) Direct marketing involves meat processor and. (iii) Dressing percentage of pig varies from to. %. (iv) After one year of economic production, layers are known as. (v) Full form of MFPO is. (vi) Equipment depreciation Cost is generally.

Term-End Examination June, 2016 MGSE-013 : GENDER TRAINING ...
(b) List and explain types of gender training 10 based on methodology. 3. Define "Empowerment". Discuss various 20 dimensions of empowerment. 4. Analyse the impact of gender training leading to 20 capacity building by using case study of elected wome

(PGDLAN) Term-End Practical Examination June, 2016 MLIL-006
MLIL-0061. No. of Printed Pages : 3. POST GRADUATE DIPLOMA IN LIBRARY. AUTOMATION AND NETWORKING. (PGDLAN). Term-End Practical Examination. June, 2016. MLIL-006 : CONTENT DEVELOPMENT. Time Allowed : 2 hours. Maximum Marks : 50. (Practical Work : 40.

Term-End Examination June, 2016 BES-051 : PRIMARY EDUCATION ...
3TrR .4-.1** 4 --iTrf2T-R i. gRi iii aftwR 4)k1 LwafriA ? 3. F-R-irorocf drit WIWI 600 qieq.14 \TR : 311,711cW. -1:1 14 3171-*1 3 anal' 4 irtf fq-*-Rcr tq. Rt3 aTrq 3174 1-4-arftfil. Facbrkid t I 3-rgi-gw T?R-Thq. 11-i7 MTT. TETUR tsiTc11 4 .31. fq-*

(CCLBL) Term-End Examination June, 2016 BLE-011 : CO-OPERATION
20. What are the different types of Weaker Section. Cooperatives ? Discuss the activities of Tribal. Co-operatives Marketing Development Federation of India Ltd. (TRIFED). 21. Explain the Cooperative Credit Structure in India. 22. Discuss the structu