Professional Documents
Culture Documents
Be Computer 8 Sem Information and Cyber Security p15 Dec 2019
Be Computer 8 Sem Information and Cyber Security p15 Dec 2019
Be Computer 8 Sem Information and Cyber Security p15 Dec 2019
8
23
P3434 [5670]-710
[Total No. of Pages : 2
ic-
tat
B.E. (Computer Engg.)
7s
INFORMATION AND CYBER SECURITY
9:4
(2015 Course) (Semester - II) (410251) (End Sem)
01 91
3:4
0
Time : 2½ Hours] [Max. Marks : 70
91
6/1 13
Instructions to the candidates:
0
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8, Q9 or Q10.
1/2
.23 GP
8
C
23
ic-
16
tat
Q1) a) Describe linear and differential cryptanalysis with suitable example [5]
8.2
7s
b) Distinguish between Substitution and transposition ciphers [5]
.24
9:4
OR
91
49
3:4
Q2) a) Explain Operational model of security in detail. [5]
30
91
plain text “WE ARE THE BEST” use key “HEAVEN” [5]
01
1/2
GP
6/1
8
23
OR
.23
Q4) a) What is Block cipher? Explain counter mode of block cipher. ic-
[5]
16
tat
8.2
9:4
91
3:4
30
b) Describe IPsec protocol with its components and security services. [8]
91
OR
01
01
1/2
GP
Q7) a) Describe briefly how IPsec works and enlist its applications. Distinguish
.23
OR
P.T.O.
49
[5670]-710 1
https://www.sppuonline.com/
Q8) a) What are various types of firewall? Discuss limitations of firewall. [9]
8
23
b) Explain need and challenges of intrusion detection system. Define
ic-
signature based IDS. [8]
tat
7s
Q9) a) Discuss PII confidentiality safeguards. [8]
9:4
b) What is cyber stalking? How to identify and detect cyber stalking. [8]
01 91
3:4
OR
0
91
Q10)a) 6/1 13
Explain personally identifiable information PII. Describe PII impact
0
levels with examples
1/2 [8]
.23 GP
8
C
23
ic-
16
tat
8.2
7s
.24
9:4
91
49
3:4
30
91
01
01
1/2
GP
6/1
CE
81
8
23
.23
ic-
16
tat
8.2
7s
.24
9:4
91
49
3:4
30
91
01
01
1/2
GP
6/1
CE
81
.23
16
8.2
.24
49
[5670]-710 2
https://www.sppuonline.com/