Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

B 0400CST434052301 Pages: 2

Reg No.:_______________ Name:__________________________


APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
Eighth Semester B.Tech Degree Regular Examination June 2023 (2019 Scheme)

Course Code: CST434


Course Name: NETWORK SECURITY PROTOCOLS
Max. Marks: 100 Duration: 3 Hours

PART A
Answer all questions, each carries 3 marks. Marks

1 Different approaches of mutual authentication to overcome replay attack? (3)


2 What is the purpose of the X.509 standard? (3)
3 Illustrate the general structure of Private Key Ring used in Pretty Good Privacy (3)
(PGP)?
4 List the three trust fields in PGP public key management? (3)
5 List out the benefits of IPSec? (3)
6 Give the header format of IKE? (3)
7 List the different real time communication security techniques? (3)
8 Illustrate the relevance of dual signature in SET? (3)
9 How trusted systems work with the help of reference monitor? (3)
10 List the services provided by IEEE802.11i? (3)
PART B
Answer any one full question from each module, each carries 14 marks.
Module I
11 a) Explain the concept of Public Key Infrastructure? (14)
OR
12 a) Discuss the overview of Kerberos? (10)
b) Explain simple Authentication Dialogue and more Secure Authentication (4)
Dialogue in Kerberos Version 4?
Module II
13 a) Explain the sequence of steps involved in the message generation and reception (14)
in PGP with block diagrams?
OR
14 a) Briefly explain about S/MIME functionality and S/MIME Messages? (14)

Page 1of 2
0400CST434052301

Module III
15 a) Explain the format of IPSec ESP header and AH header? (8)
b) Compare transport mode and tunnel mode functionalities in IPSec? (6)
OR
16 a) Explain the phases of SSL Handshake Protocol for establishing a new session. (14)
Draw a diagram which shows the action of Handshake Protocol?
Module IV
17 a) Explain in detail about HTTPS? (4)
b) Describe the working of SSH Transport Layer Protocol? (10)
OR
18 a) Explain the sequence of operations required for Secure Electronic Transaction? (14)
Module V
19 a) Explain the different types and configurations of firewalls? (14)
OR
20 a) Describe the authentication and encryption process in WEP and WPA? (14)
****

Page 2of 2

You might also like