Professional Documents
Culture Documents
Nov Dec 2023
Nov Dec 2023
8
23
P-7625 [Total No. of Pages : 2
ic-
[6180]-145
tat
2s
T.E. (Information Technology)
5:2
02 91
COMPUTER NETWORKS AND SECURITY
9:5
0
(2019 Pattern) (Semester - II) (314451)
30
2/1 13
0
Time : 2½ Hours] [Max. Marks : 70
2/2
.23 GP
8
C
23
2) Figures to the right indicate full marks.
ic-
3) Neat diagrams must be drawn wherever necessary.
16
tat
4) Use of electronic calculator is allowed
8.2
2s
5) Assume suitable data, if necessary.
.24
5:2
91
49
9:5
Q1) a) Explain Adhoc Network MAC Layer with Design Issues, Design Goal
30
30
OR
2/1
CE
8
23
b) Explain the issues in designing a Routing Protocol for Ad-hoc Wireless
.23
tat
8.2
2s
.24
5:2
Q3) a) Explain the need & importance of security and types of attack. [8]
91
49
9:5
OR
01
02
OR
.24
49
P.T.O.
Q6) a) Write a note on RSA algorithm. [9]
8
23
b) What is private key? Explain Diffie-Hellman key exchange algorithm.
ic-
[9]
tat
2s
5:2
02 91
Q7) a) What is cyber terrorism? How to identify and detect cyber stalking?
9:5
[8]
0
30
b)
2/1 13
Explain various cyber crimes and Computer criminals. [9]
0
2/2
.23 GP
OR
Q8) a) Define & explain Vulnerability, Threat, Malware & Phishing. [8]
E
81
8
C
23
b) Explain DoS Attack and SQL injection attack. [9]
ic-
16
tat
8.2
2s
.24
5:2
91
49
9:5
30
30
01
02
2/2
GP
2/1
CE
81
8
23
.23
ic-
16
tat
8.2
2s
.24
5:2
91
49
9:5
30
30
01
02
2/2
GP
2/1
CE
81
.23
16
8.2
.24
49
[6180]-145 2