Professional Documents
Culture Documents
TE IT Sem-5 Computer Network Security
TE IT Sem-5 Computer Network Security
TE IT Sem-5 Computer Network Security
C5
0B
B0
D
Paper / Subject Code: 32422 / Computer Network Security
AA
1A
D3
5D
9F
0B
CA
AD
AC
3C
FB
5D
1E
AD
DA
B1
C9
3C
4F
0
C
AA
1A
D
1E
D
9F
Time (3 Hours) [Total Marks 80]
C5
0B
CA
AD
FC
3
F4
D
E
AD
B1
31
C5
N. B:
F1
D
C
39
0
C
1A
3
F4
F
D
1. Question No. 1 is Compulsory.
1E
AD
02
C5
C9
0B
3
FB
2. Solve any THREE from Question No. 2 to 6.
4F
39
EC
D3
F
5D
9F
2
C9
31
3. Draw neat well labelled diagram wherever necessary
B0
F1
CA
3C
FC
9
AA
4
23
9F
AD
9F
1
0
F1
AD
93
Q. 1 a) A secure e-voting system is to be designed. Discuss the security goals that must met and
C
B
C
A
3
4
23
F
F
DA
B1
1E
AD
9F
enlist mechanisms for the same. (5)
31
B0
AC
4F
0
39
1A
EC
b) Explain principle elements of NAC (5)
5D
9F
1F
DA
9F
02
B
F1
C
93
c) Enlist properties & applications of Hash function. (5)
C
FB
FC
D0
A
1A
D3
F4
3
d) Describe different types of Denial of service attacks. (5)
DA
02
9
1
5
0B
CA
C9
C
93
C
F
A
A
D3
F4
23
F
F
1E
DA
1
31
C5
B
CA
Q2. a) Explain the need of Network Access Control in Enterprise Networks. Explain the major NAC
B0
C9
AC
4F
D0
39
A
D3
9F
1F
enforcement methods. (10)
1E
F
DA
B1
02
C5
C9
CA
AC
93
4F
FB
b) Explain in detail with diagram, How Kerberos can be used for authentication. (10)
D0
1A
D3
1F
23
E
F
DA
C9
C5
C9
0B
93
B0
4F
EC
AA
A
3
23
1F
9F
D
F
1
C5
B0
C9
F1
0B
93
CA
AD
AC
Q3. a) How is security achieved in the transport and tunnel modes of IPSEC? Describe the role of
3
4
23
9F
1F
D
E
AD
9F
DA
B1
AH and ESP. (10)
C5
B0
F1
AC
93
FC
D0
EC
1A
D3
F4
C5
B0
C9
F1
AC
0B
93
A
1A
EC
3
F4
23
9F
1F
5D
DA
AD
Q4. a) Explain Firewall & its types along with advantages and disadvantages (10)
0B
B0
F1
AC
93
3C
FC
1A
EC
b) Explain different modes of operation of Block ciphers (10)
5D
4
3
9F
DA
AD
9F
02
1
0B
F1
AC
93
3C
FB
C
1A
EC
5D
F4
23
1F
AD
DA
B0
C9
F1
C
93
C
EC
b) In an RSA system, given N=91 e=5 Calculate Φ(n),p, q and private key d. What is the cipher
AA
1A
D3
5D
F4
23
9F
1F
F1
0B
CA
text when you encrypt message m=25 using the public key. Also perform decryption. (10)
0
C9
AD
93
3C
FB
AA
F4
5D
1F
1E
AD
B1
02
C9
C9
AD
93
3C
4F
A
5D
23
9F
1E
AD
9F
DA
1
B0
C
3C
C
4F
0
C
AA
1A
1F
5D
AD
9F
0B
3
AD
AC
3C
C
4F
C
1F
5D
1E
AD
9F
2
DA
B1
3C
C
4F
39
D0
C
1A
e) Digital Signature
1F
1E
D
9F
2
C5
B0
0B
3
A
C
4F
39
D3
9F
1F
5D
1E
9F
2
B0
AC
3C
C
4F
39
EC
F
1F
DA
AD
9F
2
C9
B0
F1
3
C
39
AA
EC
F4
F
1F
**********
2
C9
B0
F1
D
C
39
AA
1A
F4
F
1F
2
C9
0B
B0
C9
D
3
39
AA
1A
D
1F
2
C9
C5
0B
B0
D
93
AA
1A
5D
23
F
C9
0B
B0
D
3C
AA
1A
5D
F
AD
C9
0B
D
3C
EC
AA
1A
5D
D
11948
F1
0B
CA
D
3C
1A
5D
1E
0B
CA
FC9F4F1ECAD3C5D0B1ADAAC9FB023931
3C
4F