Professional Documents
Culture Documents
Be - Inforn Technology - Semesr 5 - 2022 - May - Computer Network Security Rev 2019 C Scheme
Be - Inforn Technology - Semesr 5 - 2022 - May - Computer Network Security Rev 2019 C Scheme
Be - Inforn Technology - Semesr 5 - 2022 - May - Computer Network Security Rev 2019 C Scheme
C5
0B
B0
D
Paper / Subject Code: 32422 / Computer Network Security
AA
1A
D3
5D
9F
0B
CA
AD
AC
3C
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System ) (R-20-21) (C
FB
5D
1E
AD
DA
B1
C9
Scheme) / 32422 - Computer Network Security
3C
4F
0
C
AA
1A
QP CODE: 10011948 DATE: 24/11/2022
D
1E
D
9F
Time (3 Hours) [Total Marks 80]
C5
0B
CA
AD
FC
3
F4
D
E
AD
B1
86
C5
N. B:
F1
D
C
53
0
C
1A
3
F4
F
D
1. Question No. 1 is Compulsory.
1E
AD
06
C5
C9
0B
8
FB
2. Solve any THREE from Question No. 2 to 6.
4F
53
EC
D3
F
5D
9F
6
C9
86
3. Draw neat well labelled diagram wherever necessary
B0
F1
CA
3C
FC
3
AA
4
65
9F
AD
9F
6
0
F1
AD
38
Q. 1 a) A secure e-voting system is to be designed. Discuss the security goals that must met and
C
B
C
A
3
4
65
F
F
DA
B1
1E
AD
9F
enlist mechanisms for the same. (5)
86
B0
AC
4F
0
53
1A
EC
b) Explain principle elements of NAC (5)
5D
9F
6F
DA
9F
06
B
F1
C
38
c) Enlist properties & applications of Hash function. (5)
C
FB
FC
D0
A
1A
D3
F4
5
d) Describe different types of Denial of service attacks. (5)
DA
06
9
6
5
0B
CA
C9
C
38
C
F
A
A
D3
F4
65
F
F
1E
DA
1
86
C5
B
CA
Q2. a) Explain the need of Network Access Control in Enterprise Networks. Explain the major NAC
B0
C9
AC
4F
D0
53
A
D3
9F
6F
enforcement methods. (10)
1E
F
DA
B1
06
C5
C9
CA
AC
38
4F
FB
b) Explain in detail with diagram, How Kerberos can be used for authentication. (10)
D0
1A
D3
6F
65
E
F
DA
C9
C5
C9
0B
38
B0
4F
EC
AA
A
3
65
6F
9F
D
F
1
C5
B0
C9
F1
0B
38
CA
AD
AC
Q3. a) How is security achieved in the transport and tunnel modes of IPSEC? Describe the role of
3
4
65
9F
6F
D
E
AD
9F
DA
B1
AH and ESP. (10)
C5
B0
F1
AC
38
FC
D0
EC
1A
D3
F4
C5
B0
C9
F1
AC
0B
38
A
1A
EC
3
F4
65
9F
6F
5D
DA
AD
Q4. a) Explain Firewall & its types along with advantages and disadvantages (10)
0B
B0
F1
AC
38
3C
FC
1A
EC
b) Explain different modes of operation of Block ciphers (10)
5D
4
5
9F
DA
AD
9F
06
6
0B
F1
AC
38
3C
FB
C
1A
EC
5D
F4
65
6F
AD
DA
B0
C9
F1
C
38
C
EC
b) In an RSA system, given N=91 e=5 Calculate Φ(n),p, q and private key d. What is the cipher
AA
1A
D3
5D
F4
65
9F
6F
F1
0B
CA
text when you encrypt message m=25 using the public key. Also perform decryption. (10)
0
C9
AD
38
3C
FB
AA
F4
5D
6F
1E
AD
B1
06
C9
C9
AD
38
3C
4F
A
5D
65
9F
1E
AD
9F
DA
1
B0
C
3C
C
4F
0
C
AA
1A
6F
5D
AD
9F
0B
8
AD
AC
3C
C
4F
C
6F
5D
1E
AD
9F
6
DA
B1
3C
C
4F
53
D0
C
1A
e) Digital Signature
6F
1E
D
9F
6
C5
B0
0B
8
A
C
4F
53
D3
9F
6F
5D
1E
9F
6
B0
AC
3C
C
4F
53
EC
F
6F
DA
AD
9F
6
C9
B0
F1
8
C
53
AA
EC
F4
F
6F
**********
6
C9
B0
F1
D
C
53
AA
1A
F4
F
6F
6
C9
0B
B0
C9
D
8
53
AA
1A
D
6F
6
C9
C5
0B
B0
D
38
AA
1A
5D
65
F
C9
0B
B0
D
3C
AA
1A
5D
F
AD
C9
0B
D
3C
EC
AA
1A
5D
D
11948
F1
0B
CA
D
3C
1A
5D
1E
0B
CA
FC9F4F1ECAD3C5D0B1ADAAC9FB065386
3C
4F