Describe Oakley Key Determination Protocol. Explain SSL Handshake Protocol With Example

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

MVJ COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


INTERNAL ASSESSMENT III
Sem VIII Duration 1.5 Hr
Subject Subject INFORMATION AND
10CS835 Max.
Date 26.05.2017 Code Name NETWORK SECURITY 25
Marks

ANSWER ANY TWO QUESTIONS. ALL THE QUESTIONS CARRY EQUAL MARKS.
Course Outcomes
CO411.5.3: Differentiate various cryptography methods, Cryptographic tools and attacks.
CO411.5.5: Describe overall process of IP security, Secure Socket Layer, Transport Layer Security, Secure
Electronic Transaction.

The following are the knowledge levels according Blooms taxonomy


K1 Remember K2- Understand K3-Apply K4-Analyze K5-Evaluate K6-Create

SL. Knowledge
Question Marks CO Code
NO Level
Explain two methods of encrypting plain text into cipher text with 6.5M CO411.5.3 K2
1 a
diagram.
Define the following terms (i)cryptography
6M CO411.5.3 K2
b (ii)Steganography
(iii)Work factor
CO411.5.5 K2
2 a Describe Oakley key determination protocol. 12.5M
CO411.5.5 K2
3 a Explain SSL Handshake protocol with example. 12.5M

IA PAPER SETTER PRINCIPAL

MVJ COLLEGE OF ENGINEERING


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
INTERNAL ASSESSMENT III
Sem VIII Duration 1.5 Hr
Subject Subject INFORMATION AND
10CS835 Max.
Date 26.05.2017 Code Name NETWORK SECURITY 25
Marks

ANSWER ANY TWO QUESTIONS. ALL THE QUESTIONS CARRY EQUAL MARKS .
Course Outcomes
CO411.5.3: Differentiate various cryptography methods, Cryptographic tools and attacks.
CO411.5.5: Describe overall process of IP security, Secure Socket Layer, Transport Layer Security, Secure
Electronic Transaction.

The following are the knowledge levels according Blooms taxonomy


K1 Remember K2- Understand K3-Apply K4-Analyze K5-Evaluate K6-Create

SL. Knowledge
Question Marks CO Code
NO Level
Explain two methods of encrypting plain text into cipher text with 6.5M CO411.5.3 K2
1 a
diagram.
Define the following terms (i)cryptography
6M CO411.5.3 K2
b (ii)Steganography
(iii)Work factor
CO411.5.5 K2
2 a Describe Oakley key determination protocol. 12.5M
CO411.5.5 K2
3 a Explain SSL Handshake protocol with example. 12.5M

IA PAPER SETTER PRINCIPAL

You might also like