Be Computer 8 Sem Information and Cyber Security p15 Dec 2019

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Total No. of Questions :10] SEAT No.

8
23
P3434 [5670]-710
[Total No. of Pages : 2

ic-
tat
B.E. (Computer Engg.)

7s
INFORMATION AND CYBER SECURITY

9:4
(2015 Course) (Semester - II) (410251) (End Sem)

01 91
3:4
0
Time : 2½ Hours] [Max. Marks : 70

91
6/1 13
Instructions to the candidates:
0
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8, Q9 or Q10.
1/2
.23 GP

2) Neat diagrams must be drawn whenever necessary.


3) Figures to the right indicate full marks.
E
81

4) Assume suitable data, if necessary.

8
C

23
ic-
16

tat
Q1) a) Describe linear and differential cryptanalysis with suitable example [5]
8.2

7s
b) Distinguish between Substitution and transposition ciphers [5]
.24

9:4
OR
91
49

3:4
Q2) a) Explain Operational model of security in detail. [5]
30
91

b) What is Transposition Cipher? Use Transposition Cipher to encrypt the


01

plain text “WE ARE THE BEST” use key “HEAVEN” [5]
01
1/2
GP
6/1

Q3) a) Explain digital signature standard. [5]


CE

b) Describe Elliptic Curve Cryptography [5]


81

8
23
OR
.23

Q4) a) What is Block cipher? Explain counter mode of block cipher. ic-
[5]
16

tat
8.2

b) Write note on application and limitation of stenography. [5]


7s
.24

9:4
91

Q5) a) What is Backdoors and Key Escrow in PGP? [9]


49

3:4
30

b) Describe IPsec protocol with its components and security services. [8]
91

OR
01
01
1/2
GP

Q6) a) Explain OAKLEY key determination protocol. [9]


6/1

b) Explain Secure Electronic Transaction in detail. [8]


CE
81

Q7) a) Describe briefly how IPsec works and enlist its applications. Distinguish
.23

between tunnel and transport mode of IPsec [8]


16

b) Explain in detail password management practices. [9]


8.2
.24

OR
P.T.O.
49

[5670]-710 1

https://www.sppuonline.com/
Q8) a) What are various types of firewall? Discuss limitations of firewall. [9]

8
23
b) Explain need and challenges of intrusion detection system. Define

ic-
signature based IDS. [8]

tat
7s
Q9) a) Discuss PII confidentiality safeguards. [8]

9:4
b) What is cyber stalking? How to identify and detect cyber stalking. [8]

01 91
3:4
OR

0
91
Q10)a) 6/1 13
Explain personally identifiable information PII. Describe PII impact
0
levels with examples
1/2 [8]
.23 GP

b) Write note on Information Protection Law: Indian perspective [8]


E
81

8
C

23
ic-
16

tat

8.2

7s
.24

9:4
91
49

3:4
30
91
01
01
1/2
GP
6/1
CE
81

8
23
.23

ic-
16

tat
8.2

7s
.24

9:4
91
49

3:4
30
91
01
01
1/2
GP
6/1
CE
81
.23
16
8.2
.24
49

[5670]-710 2

https://www.sppuonline.com/

You might also like