P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) Term-End Examination December, 2013 MSEI-022 : NETWORK SECURITY
Maximum Marks : 50
Time : 2 hours
Note : Section A - Answer all the objective type questions. Section B - Answer all the very short answer type questions. Section C - Answer any 2 out of 3 short type answer questions Section D - Answer any 2 out of 3 long type questions.
1.
2.
SECTION - A (Attempt all the questions) Write True or False. 1x5=5 (a) SSL and TLS are protocols used in Network layer. (b) WEP is less secure than WAP. (c) Session Sniping is a measure taken by IDS. (d) SING is a GUI Scanning technique. (e) Handshake protocol is the most simplest part of SSL protocol. Fill in the blanks. 1x5=5 key authentication (a) Kerberos is a service developed at MIT. (b) ICMP stands for
MSEI-022
1
P.T.O.
Video watermarking , Audio water marking , Text watermarking etc. are applications of . (d) Block ciphers and Stream ciphers are types ciphers. of is a device with set of rules to (e) permit or deny Network access by unauthorised services.
(c)
SECTION - B (Attempt all the questions) 3.
Write short notes on the following : (a) IRIS recognition (b) IDS (c) IDEA (d) Firewall (e) Cryptography
5x2=10
SECTION - C (Attempt 2 out of 3 Short type questions) 5x2=10 4.
Briefly explain various stages of cryptography.
5.
Explain the process of creating and verifying a digital signature.
6.
Compare the functionalities of the Network firewalls with that of the Host - based firewalls.
MSEI-022
2
SECTION - D (Attempt 2 out of 3 Long type questions) 10x2=20 7.
What is ESP ? With the help of suitable diagram, explain IP Sec in ESP Transport mode and IP Sec in ESP Tunnel mode.
8.
What are various Security issues in wireless ? Explain the process of WEP encryption and WEP decryption with the help of a suitable diagram.
9.
What are Honeypots ? Briefly explain various types of honeypots. What are its advantages and disadvanatages ?
Section A - Answer all the objective type questions. Section B
(d) Firewall. (e) Cryptography. 5x2=10. SECTION - C. (Attempt 2 out of 3 Short type questions) 5x2=10. 4. Briefly explain various stages of cryptography. 5. Explain the process of creating and verifying a digital signature. 6. Compare the functionalities of the Network firewalls with that of the Host - based firewalls. MSEI-022. 2 ...
(c) Session Sniping is a measure taken by IDS. (d) SING is a GUI Scanning technique. (e) Handshake protocol is the most simplest part of SSL protocol. 2.
refers to e-mail that appears to have originated from one source when it was actually sent from another source. OSEI-044. 1. P.T.O.. Page 2. 3. is the ability of users to deny that they performed specific actions or transactions. 4. XSHM stands for.
b) frequency modulation for picture and amplitude modulation for sound c) amplitude .... Audio bandwidth for standard telephone is a) 30 Hz to 3000 Hz b) 50 Hz ...
A voltage to frequency converter circuit would perform a) amplitude modulation ... The power spectral density of thermal noise is given by a) kT watts per Hz.
should continue to reflect the full range of student abilities and talents (i.e. diverse and inclusive). 3. ESF has a strong, positive reputation within the Hong Kong ...
Jan 19, 2017 - respective meetings in January 2017 (this document is also published on the CMDv website). 1. What information should be present in SPC ...
On the eve of the 5th anniversary of the enactment of the RTI Act, Loksatta Sanjeevani has filed an unprecedented 500 RTI applications as part of its latest ...
ID: A. Algebra 2 - Review for Test 4.1. Answer Section. 1. (0, 0). (0, 0) x = 2 y = -1. 2. (1/5, 0) no y-int x = 0 y = -5. 3. no x-int. (0, -2/3) x = -3 y = 0. 4. (0, 0). (0, 0).
Key Vocabulary: List the key vocabulary that is covered in this lesson. Circle any terms that you are already familiar with. Titles: Locate the headings. Write a lead-in question for each heading. Key Concepts: Identify and record the key concept and
ix. 1) Approve land acquisition for a campus in Round Rock;. 2) Hire an A/E firm to begin the design of a campus in Round Rock;. 3) Reaffirm master plan recommendation for a ...... (a) IBM and Samsung are listed as the taxpayer on several accounts on
Name: Period: 1. The table below shows the number of hours Owen plays his favorite video game ... What is the domain? b. What is the range? c. ... The average cost of a movie ticket has steadily increased over time. a. Identify the dependent ...
1Refund Date: Last day to drop with tuition refund or change to audit (Census Date). 2Inactive Students Dropped Date: Students should check their course ...