Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Total No. of Questions : 4] SEAT No.

8
23
P9646 [Total No. of Pages : 1

ic-
Oct-22/TE/Insem-645

tat
T.E. (Honors/Minors)

2s
INFORMATION AND CYBER SECURITY

8:2
(2019 Pattern) (Semester-I) (310401)

02 91
0:3
0
Time : 1 Hour] [Max. Marks : 30

21
1/1 13
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4.
0
0/2
.23 GP

2) Neat diagram must be draw wherever necessary.


3) Figures to the right indicate full marks.
E
81

8
4) Assume suitable data if necessary.
C

23
5) Use of scientific calculator is permitted.

ic-
16

tat
Q1) a) What is Policy and Mechanism in computer security? [5]
8.2

2s
b) Explain in detail goals of security. [5]
.24

8:2
91
c) What is protection state? How access control model can be used as a
49

0:3
model for protection state. [5]
30
21

OR
01
02

Q2) a) What is assurance? What basis for used for determining “how much” to
0/2
GP

trust a system? [5]


1/1

b) What are basic components of computer security? [5]


CE
81

8
c) What is threat? How security services counter threats to the security of

23
.23

system? [5]
ic-
16

tat
8.2

2s

Q3) a) How extended Euclidean Algorithm can be used to calculate greatest


.24

8:2

common divisor? [5]


91
49

0:3

b) What is Transposition Cipher? Use Transposition Cipher to encrypt the


30

plain text “We Are The BEST” use key “HEAVEN” [5]
21

c) Is DES algorithm block cipher? List and explain strengths of DES


01
02

algorithm. [5]
0/2
GP

OR
1/1

Q4) a) Differentiate between substitution and transposition techniques. [5]


CE
81

b) Describe block cipher design principles. [5]


.23

c) What is modulus? List different properties of Congruences. [5]


16
8.2


.24
49

You might also like