Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

7

12
0

2
B4

BC
DE

09
Paper / Subject Code: 37481 / Cryptography and Network Security

AA
0C

21

28
C4

B4

BC
A1
DE

09
DA

0C

21
4A

28
C4
77

A1
DE

9
CB
DA

10
0A

4A
4

12
E0
Duration: 3 Hours Maximum Marks: 80

77

AC
DA

A
D
0A

0C
D

A
BE

C4
N.B.: -

B4
A

1
DE
7

A
83

AA
D

0A

0C
D
E

C4
C7

77
B
1. Question No 1 is Compulsory

B4
A

DE
DA
83
8B

0C
2. Solve any three questions out of remaining questions

BE

C4
C7

0
92

77
DA

DE
A
3
3. Assume suitable data if required and mention it clearly

B
10

0A
78

7D
8

BE

4
12

2
4. Figures to right indicate full marks

AC
BC

A
9

E
7
AA

3
0

4D
A
78
21

7D
28

A0
B4

AC
3B
C
Q1 Solve any four of following: -

A7
A

8B
10

D
0C

8
[A] What are CIA triads? 5

7D
BE
7

A0
12

92
B4

C
DE

[B] How are C-Ciphertext and P-Plaintext expressed in Caesar Cipher? Encrypt the plaintext

A7
AA

83
8B
0

D
0C

21
message “Meet me after the toga party” using it.
C4

E
5

C7

0
92
4

3B

DA
1
DE

7
DA

AA
[C] Compare block and stream Cipher. 5

B
10

0A
0C

8
28
4

BE
C7
12
[D] What are Elements of Network Access Control (NAC)? 5
77

AC

B4

DA
E

09
A

83
8B
D
0A

[E] What is an Intrusion Detection System (IDS)? Give its type. 5


C

1
D

4A
4

BE
C7
2
E0

92
7

C
DA

[F] List various services provided by IPsec. 5

A1
7

B
A

83
B
10
4D
0A

0C
7D

4A

28
BE

C7
12
C
A

9
Q2 [A] What are traditional ciphers? Discuss Hill Cipher substitution method with example.
7

10

B
DA
83

AA
ED

8B
0
D
A

0C

21
4
[B] Explain AES encryption algorithm with detailing of four different stages.
C7

10
0

92
7

AC
B

B4
DA

A1
E
7
83
8B

10
D
A

0C
D

4A
BE

C4
7

12
92

Q3 [A] Elaborate the steps of key generation using the RSA algorithm. In the RSA system, What
77
C

DE

CB
A
3
8B

AA
10

ED

0A

is the public key (E, n) and private key (D, n) and Ø (n) of this user if n=187. is defined.
78

7D

C4
12

E0
B
C

B4
A

If the plaintext input M=88, What is Ciphertext? Explain various kinds of attacks on the
09

7
AA

A
3
B

ED

4D
0A
8

0C
21

RSA algorithm. 10
7D
28

7
B4

AC
3B
C

DA
1

DE
[B] How is security achieved in the transport and tunnel modes of IPsec? What are
A7
A

8B
10
0C

8
4A

7D
E

C4
security associations?
7

A0
2

10
92

3B
C
1
DE

A7
A

DA
B
0

ED
0C

78
21
A

28
C4

A0

Q4 [A] Summarize the behaviour of SHA512 with round functions.


B4

77

10
3B
C
1
E

9
DA

B
0
D

0A
C

[B] Explain Kerberos protocol with a simplified overview.


78

10
1
4A

28
4

BE
2
E0
7

AC

BC

DA
A1

09
A7

CB

83
D

1
D

4A

Q5 [A] What is meant by Malicious software? What are its various types? Explain DOS attack. 10
C4

BE
A0

C7
2
E0

92
77

1
B

[B] What protocols comprise SSL? Explain all phases of SSL Handshake protocol in
DA

83
B
10
D
0A

0C

4A

28
4

C7

detail.
2

10
7

AC
DA

1
E

09
7

AA

8B
D
0A

0C

21
D
E

C4

92
7
3B

Q6 [A] What is Network Access Control (NAC)? Explain NAC enforcement methods. 10
B4
DA

A1
DE
A7

DA

10
8

[B] Define Firewall. What are various types of it? 10


4A
BE

C4
C7

A0

12
E0
7
A7

CB
DA
3

AA
ED

D
78

*************
C4
A0

E0
7
3B
C

B4
7

A
B

4D
0A
78

0C
7D
28

BE

AC
BC

DA
09

DE
A7
83
1

D
8

BE

C4
C7

A0
12

92

77

DA
83
B
0

ED

0A
21

28

C7

77
3B

A
A1

09

0A
78
21
4A

BE
92

DA
A1
CB

83
8B
10
4A

BE
C7
12
E0

92
CB

AA

83
B
10

28

C7
2
E0

B4

A1

09

8B
4D

0C

21
4A

92
AC

A1
DE

CB

10

29058
7D

4A
C4

12
E0

CB
DA

AA
4D

E0

DA0A77DAC4DE0CB4AA1210928BC783BE
77

AC

B4
2
8
8
8

7F
4B
3D
79
Paper / Subject Code: 37482 / IoT Architecture and Protocols

F
8C

22
82
8C
88

7F
4B
3D
01

79

F
8C

22
82
E2

8C
88

7F
4B
3D
49

9
0

87

8C
82
83

E2

C
18

4B
3D
B9

79
34

20

2
3A

8C
8
[3 hrs] [80 Marks]

8
98

4B
D
9

01

79
F5

C3

2
83

E2
A

88
22
Note: 1. Question 1 is compulsory

D8
8
3

01
7F

9
5
2. Answer any three out of remaining questions

34

C3
7
F

E2
3A

88
8C

8
3. Assume suitable data where required

F2

8
9

01

79
F5
4B

34
7

E2
A

88
C

2
82

8
2

3
8

B9

01
F

9
5
B
3D

87
7

F
4
Q1 Solve any 4

83

E2
3A
C

22
2
8C

18
8
8

B9

49
7F

5
4B
3D
79

20
a) Write your observations regarding Device Insecurity in IoT 5

2F

83
A
C
82
C
88

E
2

3
8

B9
8

49
F

F5
4B
3D
b) Explain how data rate and throughput are related 5
01

7
7

83
3A
C

2
2
E2

8C
8

2
8
8
8

9
c) Data Analytics vs Business Benefits

9
5

7F

F5
4B
3D
49

AB
79

34
0

8C

22
82
83

C
88

98
53
d) Define a smart object. 5
9E

7F
4B
D
B9

AB
9

F
34

20

C3
7

22
2
3A

e) Explain convergence of IT and OT. 88 5

53
8
8
98

7F
4B
3D
9

01

79
F5

2F
B

8C
Q2

2
3

E2
3A

C
88
22

F2
D8
8

B
9

01
7F

9
F5

C7
B

24
4

a) Sate use the use of Purdue Model for Control Hierarchy in IoT. 10

C3
87
3

E2
3A
8C

22

B8
D8
8

8
B9

1
7F

79
5
4B

b) Explain Authentication and Encryption on Constrained Nodes in 6LoWPAN 10

24
4

20

C3
F

83
A

88
8C

2
82

D8
E
2

98
3

B9

protocol
49

01
F

5
4B
3D

C3
87
7

E2
3A
8C

2
82
8C

18
Q3
2

98
B9

49
7F

F5
4B
3D
79

20

87
83
A
8C

2
82

a) Explain IoT Access Technologies LTE Cat 0 , LTE-M and NB-IoT 10


8C
88

18
2

49
7F

5
B
3D
01

AB
79

20
F
4

83

b) Explain in detail CIA for IoT 10


C

22
2
E2

8C
88

9E
3
8
8

9
7F

F5
4B
3D
49

01

AB
79

34
Q4
8C

22
82
83

E2

8C
88

98
53
F
B
3D
B9

49

01

AB

a) Elaborate how OT Network Characteristics Impacting on security aspect of IoT. 10


79

2F
4

C
2
83

E2
3A

8C
88

F2

53
8
8

b) In IoT ecosystem, describe the use of Edge computing, Fog computing, and 10
B
3D
B9

49

01

79
F5

C7

2F
24
83

E2
A

C
88

F2
B8
D8

Cloud computing. Give advantages and disadvantages of each.


8
53

B9

49

01

C7
4
C3
7
F

2
83

E2
A

8
22

Q5
B8
D8
8

98
53

B9

49

01
F

24
C3
87
C7

a) Explain any two IoT Application Layer Protocols with respect to its packet 10
83

E2
A
22

D8
8

8
53
8

B9

01
F

9
4B

C3
87
C7

format , working and security.


3

E2
A
22

18

98
53
8

B9

49
F
4B

b) List and Explain Common Challenge in Securing IoT 10


20

87
C7

83
A
22
2

18
53
8
D8

B9

Q6
F
4B

20
C7

F
3

3
3A
22
2
8C

9E
8

a) In brief explain how formal risk analysis is done using any one framework.
D8

10
9
F

F5
4B

AB
79

34
C7
3

22
2
8C

98

b) Justify IT and OT Responsibilities in the IoT Reference Model. 10


53
8
D8

F
4B

AB
9

C7

F
3
87

____________________
2
8C

53
8
D8
18

7F
4B
9

2F
20

3
87

8C
2
8C

F2
D8
E

18

B
49

C7
4
20

3
87

2
8C

B8
D8
E

18
49

29716
24
20

3
87
3

8C

D8
98

18
49

9
AB

20

C3
87
3
98

18

98
53

49
AB

20

87
83

9E

18
53

B9

53AB98349E20188798C3D824B8C7F22F
34

20
7

A8
A

D
D4
F

B6
Paper / Subject Code: 37483 / Blockchain Technology

F4
49

6A
A5
FD

47
AC

4D

AA
B6

5D
49
24

7F

D6
FD
AC

6A
AB

D4

F4
49

DB
24
D2

A5

47
C
AB

9F
A
76

B6

5D
Duration: 3hrs [Max Marks:80]

C4
2
A9

FD
D

6A
B

D4
4A
76
A5

49

DB
N.B. : (1) Question No 1 is Compulsory.

A5
9

B2
A8

AC
6D
A
(2) Attempt any three questions out of the remaining five.

9F

B6
5

2A
6A

7
A

24

C4
9
(3) All questions carry equal marks.

FD
A8

6D
5A

AB
4D

4A
(4) Assume suitable data, if required and state it clearly.

49
6A

97
A
F

D2

B2
47

AC
5A
4D

AA

9F
76

2A
5D

24
F

C4
A9
D6
47

A8
Q1. Attempt any four

6D
6A

AB

4A
A5
5D

F4

6A

97
DB

D2
a. Discuss the different opportunities associated with smart contracts.

B2
5

47

A8
6A

5A
4D
9F

76

2A
D

A
DB

8A
F
C4

A9
6
b. List different Node Types and explain their Roles. 5

6D
6A

4D
4

AA
9F
4A

A5

A
5D

97
DB

F
C4

D2
c. What is IPFS? How is IPFS helpful in blockchains? 5
B2

D6
47

A8
A

5A
9F
4A

76
B6
2A

F4

6A

8A
d. Differentiate between Kafka and RAFT 5
C4

A9
B2

FD

47
6D

6A

4D

AA
4A

A5
2A

5D
9
97

B
e. Draw the structure of the block. What is genesis block? 5

7F
4
B2

D6
D

A8
AC
6D

6A
5A

D4
F
2A

F4
49

6A
97

B
8A

A5
B2

FD
Q2. a. Explain the challenges and benefits of Cyber Security in blockchain based 10

47
C
6D
5A

4D
AA

B6
2A

5D
application.
9
97
8A

7F
4
B2
D6

FD
C
6D

6A
5A
AA

D4
4A
A
F4

b. Define crypto assets. Compare between ERC20 & ERC721.


49
10
97

DB
8A

A5
2
D6
47

AC
D
5A

B
AA

9F
76

B6
2A
5D

F4

8A

C4
9

B2
D6

FD
47

a. Discuss the different challenges addressed by blockchain in healthcare industry.


D
6A

Q3. 10
5A
AA

4A
6

A
5D

F4

49
7
DB

8A

2
9

B2
D6
47

AC
D
6A

5A

b Explain different components of Hyperledger Fabric in detail. 10


AA
9F

76

2A
5D

F4
DB

24
C4

9
D6
7

A8

6D
6A

AB

a. List different consensus algorithms. Explain Proof-of-Work consensus in detail.


D4

Q4 10
9F
4A

A5
F4

97
DB
4

D2
A5
2

6
7

8
AC

5A

b. Explain Architecture of Ethereum. 10


AB

4D
D4

A
9F

76
B6

A
24

A
F
4
D2

A5

A9
D6
D

47

A8
AC
AB

a. What is an ERC21 token? Explain the steps to create ERC21 tokens.


9F

Q5 10
B6

A5
D

A
24

F
4
D2

A5

6
D

A8
AC
AB

b. With the help of a suitable example explain the different types of accounts in 10
D4
9F
6

B6

F4

6A
97

24

Ethereum.
4
D2

A5
D

47
AC
5A

AB

4D
9F
6

B6

D
97
8A

24

7F
4
D2

Q6 Write short note on (any 4) 20


D
AC

6A
5A

AB

D4
9F
6
97

B
8A

24

4
D2

a. Different types of blockchain


A5
D
AC
5A

AB
AA

9F
6

B6
97
8A

24

b. SPV Node
4
D2
6

FD
AC
5A

AB
4D

AA

c. Metamask
49
97
8A

24
7F

D2
6

AC
5A

AB
4D

AA

d. Merkle tree
97
8A

24
7F

D2
6

5A

AB
4D
D4

AA

e. Framework in Hyperledger Fabric


97
8A
7F

D2
5

6
6A

5A
4D
D4

AA

__________________
6
97
DB

8A
7F
A5

5A
4D
D4

AA
B6

8A
7F
A5

6
D

4D
D4

AA
9F

B6

7F
4

A5

6
D
AC

4D
D4

29821 Page 1 of 1
9F

B6
4

7F
4

A5
B2

D
AC

D4
9F

B6
4

5
B2

FD
AC

76D2AB24AC49FDB6A5D47F4D6AA8A5A9
6A
F

A7
1

6D
2

C1
6C
25
Paper / Subject Code: 37484 / Web X.0

F8
FD
D0

15
2F

6D

A
C1
6C
25
7E

F8
FD
D0

15
2F
F7

6D
C1
C
5
7E
3C

F6

FD
D0

15
F7
8E
(3 Hours) [Total Marks: 80]

1
6C
5
7E
C
5D

C
2
3
N.B.: (1) Question No.1 is Compulsory.

D0

15
2F
7
E
87

F
8

C1
6C
25
7E
C
D
(2) Attempt any three questions from the remaining questions.

A7

E3

D0

5
5

2F
F7

C1
87
8

D8
(3) Assume suitable data wherever required but justify the same.

25
DF

7E
3C
7

F6
A

D0
5

7
D6

8E
87
(4) Figures to the right indicate full marks.

52
F8

7E
3C
5D
F

2
6D

A
C1

D0
(5) Answer each new question to be started on a fresh page.

7
E
87
8

CF
D

D8
15

25
F

E
F

7
D

77
E3
8A
C1
6C

0
75
D6

ED
CF
8
8
15

F
1. (a) Explain the strategy to choose a web analytics tool.
2F (5)

5D
F

7
D

77
E3
8A
1
6C
25

D6
C
Write a Typescript program to find a factorial of the given number using the “while” loop.

7
(b) (5)

CF
D8
78
D0

DF
2F

F
1

E3
8A
1
6C

75
25
7E

(c) Discuss ng-click built-in directive in AngularJS with a suitable example. (5)

D6
5C

8
78
D0

F
F

C
F7

5D
F
1

6D
52
(d) Explain the features of MongoDB. (5)

E3
8A
C1
C
7E
C

87
2

F6

D
E3

D8
D0

15

DF
F7

A7
2
D8

C1
C

75
5
7E
C

6
2

F8
F6

FD
E3

2. (a) Explain how events are handled in Node.js with EventEmitter class. Write a suitable program (10)

78
D0

15
75

F7

6D
52
D8

8A
C1
6C
8

7E
C
A7

for the same.


02

FD
E3

15
75

DF
F
F7

2
F8

D8

C1
6C
8

(b) Explain Routing using ng-Route, ng-Repeat, ng-Style, and ng-View in AngularJS with suitable (10)

25
E
C

D6
A7
6D

77
E3

D0

15
75

2F

1F
examples.
F8

F
FD

D8

6C
8

25
7E
C

5C
A7
6D

3
C1

D0
75

2F
7
E

C1
F8

F
FD

D8
8
15

25
7E
3C
A7
6D

F6
3. (a) Define Semantic Web. Explain in detail the components of the Semantic Web Stack. (10)
C1
6C

D0
75

7
8E

52
F8

CF
FD

78
15
2F

(b) State the significance of the Request Object in Express.js. Also, explain the different properties 7E (10)
5D

02
6D

E3
8A
C1
6C
25

ED
7

CF
FD

of Express.js Request Object.


8
78
0

15

DF
2F

5D
ED

77
E3
8A
C1
6C
25

D6

87

CF
77

D8
0

15

DF
2F

1F

7
ED
CF

E3
A

(a) Write a Typescript program to explain the concept of inheritance.


6C

4. (10)
5
25

D6
5C

7
F8
77
E3

D8
78
0

2F

1F
ED

C1

(b) Illustrate the use of Expressions in AngularJS with a suitable example, (10)
6D
CF
D8

8A

75
5

5C
02

F6

D
77
E3

78
75

DF
F
ED

C1
52
CF
8

8A
1

6
5D

5C
02

F6

5. (a) Explain different methods available in the networking module of Node.js. (10)
D
77
E3

DF
1F
ED

C1
7

52
CF
8
78

(b) Explain Accessing and Manipulating Databases commands in MongoDB. (10)


D6
5D

5C
02

F6
77
E3
8A

1F
ED

C1
7

52
CF
8
78
F

5D

5C
02
6D

F6
77
E3
8A

6. (a) Create a simple “Hello World” application in Express.js. Add three middleware functions to the (10)
ED

C1
7

2
CF
8
78

25
F

5D
6D

F6
77
E3

application: one called myLogger which prints a simple log message, one called requestTime
8A

D0
7

52
CF
FD

8
78
F

7E
5D

which displays the timestamp of the HTTP request, and one called validateCookies that
02
6D

E3
8A
C1

ED
7

CF
FD

8
78

validates incoming cookies.


15

5D
6D

77
E3
8A
1
6C

5C

(b) Explain REST API in detail. (10)


CF
FD

8
78
F

5D
C1

6D

E3
8A
1
5C

87
6

FD

8
F
2F

5D
A7
C1

--------------------------
6D
1
5

5C

7
02

F8
6

FD

78
2F
ED

C1

8A
1
5

D6
5C
02

F
2F

F
D

C1

6D
C1
5
7E

02

FD
5
2F
7

C1
CF

1
5
7E

5C
02

6
E3

2F
7

C1

29479
CF
D8

25
7E

6
E3

D0

2F
F7
8

5
7E
3C

75D8E3CF77ED0252F6C15C1FD6DF8A78
5D

02
59
D0

8
D

03
Paper / Subject Code: 37487 / Ethical Hacking and Digital Forensic

98

8C
A2
53

AA
0F

59
D0
8D

03
A5

8C
A2
53
F9

AA
DE

59
D0
8D
50

8C
2
FA

53
A

0A
F
DE

9
D
0
43

25
D
5

8
A

53
EA

9
AA

A
F
F
Duration: 3hrs [Max Marks:80]

D0
8D
0
43

25
D
49

5
FA

3
A

9
AA

0A
38

D5
0F
DE
43
N.B.: (1) Question No 1 is Compulsory.

3D
A0

49

8
A

EA

F9
A
8

5
(2) Attempt any three questions out of the remaining five.

CA

F
9A
03

8D
0
3

A5
4
(3) All questions carry equal marks.

98

84

FA

F9
A
CA

DE
25

A
03
(4) Assume suitable data, if required and state it clearly.

50
43
9

98
0A

98

AA

EA
AA
8

0F
3F
25
3D

03
C

D
2Q 1 Attempt any FOUR. [20]

49

A5
A4
A

FA
D5

9
0

38
CA

DE
25

A
3D
a Explain foot printing in detail. Also mention a few tools used for foot printing.
98

3
0

A4
0A

98

A
5
0F

8
D

F
25

9A
b Define digital forensics? Explain types of digital forensics.

3
A5

98

3
C

AD
A0
3

4
A

84
5
F

AA
DE

9
D0
D

A
c Classify hackers based on their knowledge and activities performed on computers.
0

3F
25

03
A5

98

8C

9
FA

53

A4
A

AA

84
0F
E

59
d List and discuss various system hacking tools.

0
8D
43

9A
AD

3
5

8C
A2

A0
3
A

9
AA

84
5
F
e Explain investigation triad in detail.
F

59
0
D

CA
0
43

AD

3D

03
49

98

A2
EA
AA

98

AA
38

D5
F
F

0
0
3

25
AD

3D
0

49

A5

98
4

8C
AA

2 a Explain penetration testing with its various phases? Also explain how social engineering [10]
A

0A
38

D5
F
3F

DE

59
A

0
8C

3D
0

98
4

A2
can be used for penetration testing.
AA

84

EA
AA
59

D5
0F
F

D0
3

3
8C
A2

AD
A0

b What is ethical hacking? Describe the steps of the ethical hacking process. [10]
A5

98
4
84

53
A
59
D0

0F
3F

DE
A
03

8D
8C
A2

49
3

A5
A4
A

A
D5

F9
59
D0

38
A

DE
A

3 a Explain incident response methodology in detail. [10]


50
98

3
C
A2

A0

49
3

4
98

FA
D5

EA
0F

AA
D0

38
A

b Explain the guidelines for digital forensics report writing along with its goals. [10]
5
A5

98

43
C
A2

AD
0

49
3

98

AA
D5
0F

AA
DE

D0

3F
25

03
A5

98

8C

49
FA

53

A4
A

A
0F

4 a Explain the importance of forensics duplication and its methods. [10]


DE

9
0

38
8D

A
43

9A
D
A5

8C
2

0
A

53
F9

b Define the following terms: a. Bit-stream image b. Chain of custody c. Evidence custody [10]
84
3F

DE

59
0
D

CA
50

03
98
4

2
A

53
EA

form d. Evidence bags e. Repeatable findings f. forensic workstations g. qualified forensic


AA

98

AA
0F
3F

0
D

25
AD

D
49

A5

8
4

8C

duplicate h. restored image i. mirror image j. Volatile data


53
9
AA

0A
38

F
F

DE

59
8D
0
43

3D
A0

A2
84

EA

9
A

D5
F
3F
9A

D0
03

5 a Explain the roles of an expert witness and scientific witness with suitable examples? [10]
AD

98
4
AA

53
EA
AA
38

0F
F

8D

b Briefly explain the types of digital evidence with examples. [10]


3
8C

D
A0

A5
4
84

FA

F9
AA
59

CA

DE
03

50
43
A2

9
8

AA

84

EA
AA
59

6 Write short note on the following: (any two) [20]


F
03

3
8C
2

AD
9

A4
0A

AA

84
59

3F

a) Volatile data collection for Windows system.


A
3D

03
8C
A2

A4

b) Analysis of forensics data in Linux system


AA

4
D5

59
D0

9A
3

c) Data carving and various tools of forensic analysis


98

8C
A2

0
53

AA

84
59
D0
8D

03
C
A2
53
F9

98

AA

*********
D0
8D
50

8C
A2

30041
53
EA

9
0F

59
D0
8D
AD

A5

A2
53
F9
DE

D0
8D
50
FA

53
EA

A43FADEA50F98D53D0A2598CAA03849A
F9

You might also like