Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

41

61

5F
A0

BC

0
Paper / Subject Code: 32422 / Computer Network Security

F1

68
D0
5

1
F2

41

61
A0
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System )

BC

5
9A

F1

68
D0
5
(R- 19) (C Scheme) / 32422 - Computer Network Security QP CODE: 10025760 DATE: 25/05/2023

1
F2

41
FD

61
A0

BC
9A

F1
22

D0
5

1
Time: 3 hours Max. Marks: 80

F2

41
FD
B0

A0

BC
9A

0
=====================================================================

22
AA

D0
5

1
F2
FD
B0

A0
INSTRUCTIONS

BC
F6

9A

0
22
AA

D0
5
(1) Question 1 is compulsory.

85

1
F2
FD
B0

A0

BC
16

F6
(2) Attempt any three from the remaining questions.

9A
22
AA

5
6

85

1
F2
F1
(3) Draw neat diagrams wherever necessary.

FD
B0

A0
16

F6

9A
41

22
AA

5
6

85

F2
00

F1

FD
B0
Q1 5 marks each

16

F6

A
CD

9A
41

22
AA

5
6

85

F2
00

F1

FD
B

B0
a) Explain Security Services and mechanisms to implement it.

16

F6
01

CD

9A
41

22
AA
6

85
5A
Compare HMAC and CMAC

00
b)

F1

FD
B

B0
16

F6
01

CD
F2

41

22
AA
6
Explain different NAC enforcement methods

85
c)
5A
9A

00

F1
B

B0
16

F6

F
01

CD
F2

41
FD

22
AA
d) Explain SSH protocol stack in brief

85
5A
9A

00

F1
B

B0
22

16

F6
01

CD
F2

41
FD
B0

AA
6

85
5A
9A

00

F1
B
22
AA

16

F6
10 marks each

01
Q2

CD
F2

41
FD
B0

85
F6

5A
9A

00

F1
B
22
AA

16
85

a) Explain Playfair cipher with example

01

CD
F2

41
FD
B0

6
16

F6

5A
9A

00

F1
B
22
AA

b) Describe different Block Cipher modes


16

85

01

CD
F2

41
FD
B0
1F

16

F6

5A
9A

00
B
Q3 10 marks each
22
AA
04

16

85

01

CD
F2
FD
B0
D0

1F

16

F6

5A
9A
a) State firewall design principles and its types with advantages.

B
22
AA
04

16
BC

85

01
F2
FD
0
D0

1F

16

F6

AB

5A
01

b) Describe different types of protocol offered by SSL. 9A


22
04

16
BC

85
5A

F2
6A

FD
B0
D0

1F

16
01

9A
2

5F

22
AA
AF

04

16
BC
5A

FD
68

0
D0

1F
D9

F6

AB
01
2

Q4 10 marks each
61

22
AF

04
BC

85
2F

5A

6A
F1

B0
D0
D9

16
02

01
F2

a) What is Network access control? Discuss the elements present in this context.
41

5F

AA
16
BC
B

5A
9A

8
22
AA

D0

1F

16

b) Explain Kerberos Protocol in detail.


F6
01
2
FD
B0

AF

04

16
BC

85
5A
22
AA

D0

1F
D9

16
01
2
B0

AF

04

16
BC
F6

2F

5A

Q5 10 marks each
AA

D0

1F
D9
85

02

01
2
AF

04
BC
16

F6

AB

Explain the working of IPsec in its different mode.


2F

5A

a)
D0
16

D9
85

02

01
F2
6A

b) What is Network Management Security? Explain SNMP V3.


BC
16

AB

2F

5A
9A
5F
16

02

01
F2
6A

FD
68
1F

AB

5A
9A
61

5F

22
04

Q6 10 marks each
F2
6A
F1

FD
68

B0
D0

9A
41

61

5F

22
AA

Explain IDS and its types in detail.


BC

a)
00

F1

FD
68

B0
F6
CD

41

61

22

b) Define Malware. Explain at least five types with example.


AA
85
00

F1
1B

B0
16

F6
CD

____________________________
41
A0

AA
16

85
00
1B
25

1F

16

F6
CD
A0
AF

04

16

85
1B

D0
25

1F

16
A0
AF

04

16
BC

D0
25

1F
D9

01
AF

04
BC
2F

5A

D0
D9
02

25760 Page 1 of 1
01
F2

BC
AB

2F

5A
9A
02

01
F2
FD
AB

5A
9A

AAB022FD9AF25A01BCD0041F161685F6
22

You might also like