Professional Documents
Culture Documents
06 VI IoT J2023
06 VI IoT J2023
12
0
2
B4
BC
DE
09
Paper / Subject Code: 37481 / Cryptography and Network Security
AA
0C
21
28
C4
B4
BC
A1
DE
09
DA
0C
21
4A
28
C4
77
A1
DE
9
CB
DA
10
0A
4A
4
12
E0
Duration: 3 Hours Maximum Marks: 80
77
AC
DA
A
D
0A
0C
D
A
BE
C4
N.B.: -
B4
A
1
DE
7
A
83
AA
D
0A
0C
D
E
C4
C7
77
B
1. Question No 1 is Compulsory
B4
A
DE
DA
83
8B
0C
2. Solve any three questions out of remaining questions
BE
C4
C7
0
92
77
DA
DE
A
3
3. Assume suitable data if required and mention it clearly
B
10
0A
78
7D
8
BE
4
12
2
4. Figures to right indicate full marks
AC
BC
A
9
E
7
AA
3
0
4D
A
78
21
7D
28
A0
B4
AC
3B
C
Q1 Solve any four of following: -
A7
A
8B
10
D
0C
8
[A] What are CIA triads? 5
7D
BE
7
A0
12
92
B4
C
DE
[B] How are C-Ciphertext and P-Plaintext expressed in Caesar Cipher? Encrypt the plaintext
A7
AA
83
8B
0
D
0C
21
message “Meet me after the toga party” using it.
C4
E
5
C7
0
92
4
3B
DA
1
DE
7
DA
AA
[C] Compare block and stream Cipher. 5
B
10
0A
0C
8
28
4
BE
C7
12
[D] What are Elements of Network Access Control (NAC)? 5
77
AC
B4
DA
E
09
A
83
8B
D
0A
1
D
4A
4
BE
C7
2
E0
92
7
C
DA
A1
7
B
A
83
B
10
4D
0A
0C
7D
4A
28
BE
C7
12
C
A
9
Q2 [A] What are traditional ciphers? Discuss Hill Cipher substitution method with example.
7
10
B
DA
83
AA
ED
8B
0
D
A
0C
21
4
[B] Explain AES encryption algorithm with detailing of four different stages.
C7
10
0
92
7
AC
B
B4
DA
A1
E
7
83
8B
10
D
A
0C
D
4A
BE
C4
7
12
92
Q3 [A] Elaborate the steps of key generation using the RSA algorithm. In the RSA system, What
77
C
DE
CB
A
3
8B
AA
10
ED
0A
is the public key (E, n) and private key (D, n) and Ø (n) of this user if n=187. is defined.
78
7D
C4
12
E0
B
C
B4
A
If the plaintext input M=88, What is Ciphertext? Explain various kinds of attacks on the
09
7
AA
A
3
B
ED
4D
0A
8
0C
21
RSA algorithm. 10
7D
28
7
B4
AC
3B
C
DA
1
DE
[B] How is security achieved in the transport and tunnel modes of IPsec? What are
A7
A
8B
10
0C
8
4A
7D
E
C4
security associations?
7
A0
2
10
92
3B
C
1
DE
A7
A
DA
B
0
ED
0C
78
21
A
28
C4
A0
77
10
3B
C
1
E
9
DA
B
0
D
0A
C
10
1
4A
28
4
BE
2
E0
7
AC
BC
DA
A1
09
A7
CB
83
D
1
D
4A
Q5 [A] What is meant by Malicious software? What are its various types? Explain DOS attack. 10
C4
BE
A0
C7
2
E0
92
77
1
B
[B] What protocols comprise SSL? Explain all phases of SSL Handshake protocol in
DA
83
B
10
D
0A
0C
4A
28
4
C7
detail.
2
10
7
AC
DA
1
E
09
7
AA
8B
D
0A
0C
21
D
E
C4
92
7
3B
Q6 [A] What is Network Access Control (NAC)? Explain NAC enforcement methods. 10
B4
DA
A1
DE
A7
DA
10
8
C4
C7
A0
12
E0
7
A7
CB
DA
3
AA
ED
D
78
*************
C4
A0
E0
7
3B
C
B4
7
A
B
4D
0A
78
0C
7D
28
BE
AC
BC
DA
09
DE
A7
83
1
D
8
BE
C4
C7
A0
12
92
77
DA
83
B
0
ED
0A
21
28
C7
77
3B
A
A1
09
0A
78
21
4A
BE
92
DA
A1
CB
83
8B
10
4A
BE
C7
12
E0
92
CB
AA
83
B
10
28
C7
2
E0
B4
A1
09
8B
4D
0C
21
4A
92
AC
A1
DE
CB
10
29058
7D
4A
C4
12
E0
CB
DA
AA
4D
E0
DA0A77DAC4DE0CB4AA1210928BC783BE
77
AC
B4
2
8
8
8
7F
4B
3D
79
Paper / Subject Code: 37482 / IoT Architecture and Protocols
F
8C
22
82
8C
88
7F
4B
3D
01
79
F
8C
22
82
E2
8C
88
7F
4B
3D
49
9
0
87
8C
82
83
E2
C
18
4B
3D
B9
79
34
20
2
3A
8C
8
[3 hrs] [80 Marks]
8
98
4B
D
9
01
79
F5
C3
2
83
E2
A
88
22
Note: 1. Question 1 is compulsory
D8
8
3
01
7F
9
5
2. Answer any three out of remaining questions
34
C3
7
F
E2
3A
88
8C
8
3. Assume suitable data where required
F2
8
9
01
79
F5
4B
34
7
E2
A
88
C
2
82
8
2
3
8
B9
01
F
9
5
B
3D
87
7
F
4
Q1 Solve any 4
83
E2
3A
C
22
2
8C
18
8
8
B9
49
7F
5
4B
3D
79
20
a) Write your observations regarding Device Insecurity in IoT 5
2F
83
A
C
82
C
88
E
2
3
8
B9
8
49
F
F5
4B
3D
b) Explain how data rate and throughput are related 5
01
7
7
83
3A
C
2
2
E2
8C
8
2
8
8
8
9
c) Data Analytics vs Business Benefits
9
5
7F
F5
4B
3D
49
AB
79
34
0
8C
22
82
83
C
88
98
53
d) Define a smart object. 5
9E
7F
4B
D
B9
AB
9
F
34
20
C3
7
22
2
3A
53
8
8
98
7F
4B
3D
9
01
79
F5
2F
B
8C
Q2
2
3
E2
3A
C
88
22
F2
D8
8
B
9
01
7F
9
F5
C7
B
24
4
a) Sate use the use of Purdue Model for Control Hierarchy in IoT. 10
C3
87
3
E2
3A
8C
22
B8
D8
8
8
B9
1
7F
79
5
4B
24
4
20
C3
F
83
A
88
8C
2
82
D8
E
2
98
3
B9
protocol
49
01
F
5
4B
3D
C3
87
7
E2
3A
8C
2
82
8C
18
Q3
2
98
B9
49
7F
F5
4B
3D
79
20
87
83
A
8C
2
82
18
2
49
7F
5
B
3D
01
AB
79
20
F
4
83
22
2
E2
8C
88
9E
3
8
8
9
7F
F5
4B
3D
49
01
AB
79
34
Q4
8C
22
82
83
E2
8C
88
98
53
F
B
3D
B9
49
01
AB
2F
4
C
2
83
E2
3A
8C
88
F2
53
8
8
b) In IoT ecosystem, describe the use of Edge computing, Fog computing, and 10
B
3D
B9
49
01
79
F5
C7
2F
24
83
E2
A
C
88
F2
B8
D8
B9
49
01
C7
4
C3
7
F
2
83
E2
A
8
22
Q5
B8
D8
8
98
53
B9
49
01
F
24
C3
87
C7
a) Explain any two IoT Application Layer Protocols with respect to its packet 10
83
E2
A
22
D8
8
8
53
8
B9
01
F
9
4B
C3
87
C7
E2
A
22
18
98
53
8
B9
49
F
4B
87
C7
83
A
22
2
18
53
8
D8
B9
Q6
F
4B
20
C7
F
3
3
3A
22
2
8C
9E
8
a) In brief explain how formal risk analysis is done using any one framework.
D8
10
9
F
F5
4B
AB
79
34
C7
3
22
2
8C
98
F
4B
AB
9
C7
F
3
87
____________________
2
8C
53
8
D8
18
7F
4B
9
2F
20
3
87
8C
2
8C
F2
D8
E
18
B
49
C7
4
20
3
87
2
8C
B8
D8
E
18
49
29716
24
20
3
87
3
8C
D8
98
18
49
9
AB
20
C3
87
3
98
18
98
53
49
AB
20
87
83
9E
18
53
B9
53AB98349E20188798C3D824B8C7F22F
34
20
7
A8
A
D
D4
F
B6
Paper / Subject Code: 37483 / Blockchain Technology
F4
49
6A
A5
FD
47
AC
4D
AA
B6
5D
49
24
7F
D6
FD
AC
6A
AB
D4
F4
49
DB
24
D2
A5
47
C
AB
9F
A
76
B6
5D
Duration: 3hrs [Max Marks:80]
C4
2
A9
FD
D
6A
B
D4
4A
76
A5
49
DB
N.B. : (1) Question No 1 is Compulsory.
A5
9
B2
A8
AC
6D
A
(2) Attempt any three questions out of the remaining five.
9F
B6
5
2A
6A
7
A
24
C4
9
(3) All questions carry equal marks.
FD
A8
6D
5A
AB
4D
4A
(4) Assume suitable data, if required and state it clearly.
49
6A
97
A
F
D2
B2
47
AC
5A
4D
AA
9F
76
2A
5D
24
F
C4
A9
D6
47
A8
Q1. Attempt any four
6D
6A
AB
4A
A5
5D
F4
6A
97
DB
D2
a. Discuss the different opportunities associated with smart contracts.
B2
5
47
A8
6A
5A
4D
9F
76
2A
D
A
DB
8A
F
C4
A9
6
b. List different Node Types and explain their Roles. 5
6D
6A
4D
4
AA
9F
4A
A5
A
5D
97
DB
F
C4
D2
c. What is IPFS? How is IPFS helpful in blockchains? 5
B2
D6
47
A8
A
5A
9F
4A
76
B6
2A
F4
6A
8A
d. Differentiate between Kafka and RAFT 5
C4
A9
B2
FD
47
6D
6A
4D
AA
4A
A5
2A
5D
9
97
B
e. Draw the structure of the block. What is genesis block? 5
7F
4
B2
D6
D
A8
AC
6D
6A
5A
D4
F
2A
F4
49
6A
97
B
8A
A5
B2
FD
Q2. a. Explain the challenges and benefits of Cyber Security in blockchain based 10
47
C
6D
5A
4D
AA
B6
2A
5D
application.
9
97
8A
7F
4
B2
D6
FD
C
6D
6A
5A
AA
D4
4A
A
F4
DB
8A
A5
2
D6
47
AC
D
5A
B
AA
9F
76
B6
2A
5D
F4
8A
C4
9
B2
D6
FD
47
Q3. 10
5A
AA
4A
6
A
5D
F4
49
7
DB
8A
2
9
B2
D6
47
AC
D
6A
5A
76
2A
5D
F4
DB
24
C4
9
D6
7
A8
6D
6A
AB
Q4 10
9F
4A
A5
F4
97
DB
4
D2
A5
2
6
7
8
AC
5A
4D
D4
A
9F
76
B6
A
24
A
F
4
D2
A5
A9
D6
D
47
A8
AC
AB
Q5 10
B6
A5
D
A
24
F
4
D2
A5
6
D
A8
AC
AB
b. With the help of a suitable example explain the different types of accounts in 10
D4
9F
6
B6
F4
6A
97
24
Ethereum.
4
D2
A5
D
47
AC
5A
AB
4D
9F
6
B6
D
97
8A
24
7F
4
D2
6A
5A
AB
D4
9F
6
97
B
8A
24
4
D2
AB
AA
9F
6
B6
97
8A
24
b. SPV Node
4
D2
6
FD
AC
5A
AB
4D
AA
c. Metamask
49
97
8A
24
7F
D2
6
AC
5A
AB
4D
AA
d. Merkle tree
97
8A
24
7F
D2
6
5A
AB
4D
D4
AA
D2
5
6
6A
5A
4D
D4
AA
__________________
6
97
DB
8A
7F
A5
5A
4D
D4
AA
B6
8A
7F
A5
6
D
4D
D4
AA
9F
B6
7F
4
A5
6
D
AC
4D
D4
29821 Page 1 of 1
9F
B6
4
7F
4
A5
B2
D
AC
D4
9F
B6
4
5
B2
FD
AC
76D2AB24AC49FDB6A5D47F4D6AA8A5A9
6A
F
A7
1
6D
2
C1
6C
25
Paper / Subject Code: 37484 / Web X.0
F8
FD
D0
15
2F
6D
A
C1
6C
25
7E
F8
FD
D0
15
2F
F7
6D
C1
C
5
7E
3C
F6
FD
D0
15
F7
8E
(3 Hours) [Total Marks: 80]
1
6C
5
7E
C
5D
C
2
3
N.B.: (1) Question No.1 is Compulsory.
D0
15
2F
7
E
87
F
8
C1
6C
25
7E
C
D
(2) Attempt any three questions from the remaining questions.
A7
E3
D0
5
5
2F
F7
C1
87
8
D8
(3) Assume suitable data wherever required but justify the same.
25
DF
7E
3C
7
F6
A
D0
5
7
D6
8E
87
(4) Figures to the right indicate full marks.
52
F8
7E
3C
5D
F
2
6D
A
C1
D0
(5) Answer each new question to be started on a fresh page.
7
E
87
8
CF
D
D8
15
25
F
E
F
7
D
77
E3
8A
C1
6C
0
75
D6
ED
CF
8
8
15
F
1. (a) Explain the strategy to choose a web analytics tool.
2F (5)
5D
F
7
D
77
E3
8A
1
6C
25
D6
C
Write a Typescript program to find a factorial of the given number using the “while” loop.
7
(b) (5)
CF
D8
78
D0
DF
2F
F
1
E3
8A
1
6C
75
25
7E
(c) Discuss ng-click built-in directive in AngularJS with a suitable example. (5)
D6
5C
8
78
D0
F
F
C
F7
5D
F
1
6D
52
(d) Explain the features of MongoDB. (5)
E3
8A
C1
C
7E
C
87
2
F6
D
E3
D8
D0
15
DF
F7
A7
2
D8
C1
C
75
5
7E
C
6
2
F8
F6
FD
E3
2. (a) Explain how events are handled in Node.js with EventEmitter class. Write a suitable program (10)
78
D0
15
75
F7
6D
52
D8
8A
C1
6C
8
7E
C
A7
FD
E3
15
75
DF
F
F7
2
F8
D8
C1
6C
8
(b) Explain Routing using ng-Route, ng-Repeat, ng-Style, and ng-View in AngularJS with suitable (10)
25
E
C
D6
A7
6D
77
E3
D0
15
75
2F
1F
examples.
F8
F
FD
D8
6C
8
25
7E
C
5C
A7
6D
3
C1
D0
75
2F
7
E
C1
F8
F
FD
D8
8
15
25
7E
3C
A7
6D
F6
3. (a) Define Semantic Web. Explain in detail the components of the Semantic Web Stack. (10)
C1
6C
D0
75
7
8E
52
F8
CF
FD
78
15
2F
(b) State the significance of the Request Object in Express.js. Also, explain the different properties 7E (10)
5D
02
6D
E3
8A
C1
6C
25
ED
7
CF
FD
15
DF
2F
5D
ED
77
E3
8A
C1
6C
25
D6
87
CF
77
D8
0
15
DF
2F
1F
7
ED
CF
E3
A
4. (10)
5
25
D6
5C
7
F8
77
E3
D8
78
0
2F
1F
ED
C1
(b) Illustrate the use of Expressions in AngularJS with a suitable example, (10)
6D
CF
D8
8A
75
5
5C
02
F6
D
77
E3
78
75
DF
F
ED
C1
52
CF
8
8A
1
6
5D
5C
02
F6
5. (a) Explain different methods available in the networking module of Node.js. (10)
D
77
E3
DF
1F
ED
C1
7
52
CF
8
78
5C
02
F6
77
E3
8A
1F
ED
C1
7
52
CF
8
78
F
5D
5C
02
6D
F6
77
E3
8A
6. (a) Create a simple “Hello World” application in Express.js. Add three middleware functions to the (10)
ED
C1
7
2
CF
8
78
25
F
5D
6D
F6
77
E3
application: one called myLogger which prints a simple log message, one called requestTime
8A
D0
7
52
CF
FD
8
78
F
7E
5D
which displays the timestamp of the HTTP request, and one called validateCookies that
02
6D
E3
8A
C1
ED
7
CF
FD
8
78
5D
6D
77
E3
8A
1
6C
5C
8
78
F
5D
C1
6D
E3
8A
1
5C
87
6
FD
8
F
2F
5D
A7
C1
--------------------------
6D
1
5
5C
7
02
F8
6
FD
78
2F
ED
C1
8A
1
5
D6
5C
02
F
2F
F
D
C1
6D
C1
5
7E
02
FD
5
2F
7
C1
CF
1
5
7E
5C
02
6
E3
2F
7
C1
29479
CF
D8
25
7E
6
E3
D0
2F
F7
8
5
7E
3C
75D8E3CF77ED0252F6C15C1FD6DF8A78
5D
02
59
D0
8
D
03
Paper / Subject Code: 37487 / Ethical Hacking and Digital Forensic
98
8C
A2
53
AA
0F
59
D0
8D
03
A5
8C
A2
53
F9
AA
DE
59
D0
8D
50
8C
2
FA
53
A
0A
F
DE
9
D
0
43
25
D
5
8
A
53
EA
9
AA
A
F
F
Duration: 3hrs [Max Marks:80]
D0
8D
0
43
25
D
49
5
FA
3
A
9
AA
0A
38
D5
0F
DE
43
N.B.: (1) Question No 1 is Compulsory.
3D
A0
49
8
A
EA
F9
A
8
5
(2) Attempt any three questions out of the remaining five.
CA
F
9A
03
8D
0
3
A5
4
(3) All questions carry equal marks.
98
84
FA
F9
A
CA
DE
25
A
03
(4) Assume suitable data, if required and state it clearly.
50
43
9
98
0A
98
AA
EA
AA
8
0F
3F
25
3D
03
C
D
2Q 1 Attempt any FOUR. [20]
49
A5
A4
A
FA
D5
9
0
38
CA
DE
25
A
3D
a Explain foot printing in detail. Also mention a few tools used for foot printing.
98
3
0
A4
0A
98
A
5
0F
8
D
F
25
9A
b Define digital forensics? Explain types of digital forensics.
3
A5
98
3
C
AD
A0
3
4
A
84
5
F
AA
DE
9
D0
D
A
c Classify hackers based on their knowledge and activities performed on computers.
0
3F
25
03
A5
98
8C
9
FA
53
A4
A
AA
84
0F
E
59
d List and discuss various system hacking tools.
0
8D
43
9A
AD
3
5
8C
A2
A0
3
A
9
AA
84
5
F
e Explain investigation triad in detail.
F
59
0
D
CA
0
43
AD
3D
03
49
98
A2
EA
AA
98
AA
38
D5
F
F
0
0
3
25
AD
3D
0
49
A5
98
4
8C
AA
2 a Explain penetration testing with its various phases? Also explain how social engineering [10]
A
0A
38
D5
F
3F
DE
59
A
0
8C
3D
0
98
4
A2
can be used for penetration testing.
AA
84
EA
AA
59
D5
0F
F
D0
3
3
8C
A2
AD
A0
b What is ethical hacking? Describe the steps of the ethical hacking process. [10]
A5
98
4
84
53
A
59
D0
0F
3F
DE
A
03
8D
8C
A2
49
3
A5
A4
A
A
D5
F9
59
D0
38
A
DE
A
3
C
A2
A0
49
3
4
98
FA
D5
EA
0F
AA
D0
38
A
b Explain the guidelines for digital forensics report writing along with its goals. [10]
5
A5
98
43
C
A2
AD
0
49
3
98
AA
D5
0F
AA
DE
D0
3F
25
03
A5
98
8C
49
FA
53
A4
A
A
0F
9
0
38
8D
A
43
9A
D
A5
8C
2
0
A
53
F9
b Define the following terms: a. Bit-stream image b. Chain of custody c. Evidence custody [10]
84
3F
DE
59
0
D
CA
50
03
98
4
2
A
53
EA
98
AA
0F
3F
0
D
25
AD
D
49
A5
8
4
8C
0A
38
F
F
DE
59
8D
0
43
3D
A0
A2
84
EA
9
A
D5
F
3F
9A
D0
03
5 a Explain the roles of an expert witness and scientific witness with suitable examples? [10]
AD
98
4
AA
53
EA
AA
38
0F
F
8D
D
A0
A5
4
84
FA
F9
AA
59
CA
DE
03
50
43
A2
9
8
AA
84
EA
AA
59
3
8C
2
AD
9
A4
0A
AA
84
59
3F
03
8C
A2
A4
4
D5
59
D0
9A
3
8C
A2
0
53
AA
84
59
D0
8D
03
C
A2
53
F9
98
AA
*********
D0
8D
50
8C
A2
30041
53
EA
9
0F
59
D0
8D
AD
A5
A2
53
F9
DE
D0
8D
50
FA
53
EA
A43FADEA50F98D53D0A2598CAA03849A
F9