Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

Visit hiddencomputertricks.blogspot.com for more...

Mumbai University
Bachelor of Information Technology (B.Sc. IT)
Third year Semester V
Internet Security
2007

CON. 4759-07 BS-4563


(3 Hours) [Total Marks: 100

N.B. 1. Question No.1 is Compulsory.


2. From the remaining (Q Nos. 2 to 7) attempt any four.
3. Draw neat labeled diagram whenever necessary
Q1 a) Why do we need security? Discuss. 05
b) Write note on Incident Handling. 05
c) What are the different types of viruses? 05
d) Explain the general working of Digital Signatures. 05
Q2 a) What is security policy? Explain the characteristics of security policy. 08
b) Why do we need firewall? Discuss the various types of firewalls. 08
c) Write a note on Social Engineering. 04
Q3 a) Write the Difffie-Hellmen key Exchange algorithm and explain it in brief. Alex 08
and Bob want to establish a secret key using this algorithm. Given: n=11, x=2,
y=3. Find the value of secret key (K1 and K2)
b) What are the different ways of sniffing the password? How password sniffing 08
can be avoided?
c) Write a note on Digging of Worms. 04
Q4 a) Write any one Asymmetric Cryptographic algorithm and explain its 08
performance with suitable example.
b) Explain the concept of filtering by service with respect to TELNET. 08
c) Write note on DOS attack. 04
Q5 a) Define message digest. Write any one message digest algorithm. 08
b) State and explain various types of security models. 08
c) Write a note on Information Leakage. 04
Q6 a) How do worms and other viruses spread? How to protect the computer from 08
viruses and worms.
b) What are bugs and backdoor? What prevention mechanism can be used for 08
them?
c) Write short note on Botnets. 04
Q7 a) State the differences between Traditional Firewall and Distributed Firewall? 08
b) 08
What is proxy server? It is observed that the "Default Deny" stance is much
safer to implement on a proxy server rather than "Default Permit". Them why
do managers and users still prefer to implement the "Default Permit" stance.
Explain with reasons.
c) What are the principles of security? 04

Created by SARITA V PRAJAPATI Hi

You might also like