0% found this document useful (0 votes)
168 views

QP16 Network Security

This document is a question paper for an examination on Network Security. It contains 15 questions split into two parts. Part A contains 10 short answer questions worth 2 marks each on topics like cryptography, digital signatures, MAC, public key certificates, Kerberos, IPSec applications, and differences between application/network level gateways, honeypots, and active attack patterns. Part B contains 5 longer answer questions worth 16 marks each, allowing a choice between two topics, on subjects like block ciphers, symmetric encryption, hash functions, Diffie-Hellman key exchange, digital signatures, RSA, Kerberos architecture, IPSec, E-mail/MIME, password management, viruses/worms, wireless LAN security factors and mechanisms
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views

QP16 Network Security

This document is a question paper for an examination on Network Security. It contains 15 questions split into two parts. Part A contains 10 short answer questions worth 2 marks each on topics like cryptography, digital signatures, MAC, public key certificates, Kerberos, IPSec applications, and differences between application/network level gateways, honeypots, and active attack patterns. Part B contains 5 longer answer questions worth 16 marks each, allowing a choice between two topics, on subjects like block ciphers, symmetric encryption, hash functions, Diffie-Hellman key exchange, digital signatures, RSA, Kerberos architecture, IPSec, E-mail/MIME, password management, viruses/worms, wireless LAN security factors and mechanisms
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

Question Paper Code : 51158

B.E./B.Tech. DEGREE EXAMINATION, APRIL/MAY 2015.

Sixth/Eighth Semester

Electronic Communication and Engineering

CS 1028 A - NETWORK SECURITY

(Regulation 2008)

Time : Three hours Maximum : 100 marks

Answer ALL questions.

PART A - (10 x 2 = 20 marks)


1. Define cryptography.
2. What is digital Signatures?
3. What is MAC?

4. What is a public key certificate?


5. Define Kerberos.
6. What are the applications of IPSec?
7. Differentiate application level gateway and network level gateways.
8. What are honeypots?
9. What are the active attack patterns?
10. What is WEP encryption

PART B - (5 x 16 = 80 marks)

11. (a) Explain the features of block Ciphers and data encryption standards in
detail. (6+10)

Or
(b) Explain how symmetric encryption provides confidentiality with an
example. (16)

PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor
12. (a) (i) Define hash function. Explain the properties of hash functions. (8)
(ii) Describe Diffie - Hellman key exchange algorithm with an example.
(8)

Or
(b) (i) Discuss the digital signature standard and its algorithm with
example. (8)
(ii) Explain RSA public key cryptosystem with an example.. (8)

13. (a) Discuss about Kerberos X. 509 architecture and authentication services
in detail. (16)

Or
(b) (i) Describe IP security architecture in detail. (8)
(ii) Explain E-Mail application and MIME. (8)

14. (a) Explain various password management mechanisms with examples. (16)
Or
(b) Explain viruses and worms and the threats posed by them. (8+8)

15. (a) Explain the wireless LAN security factors and security mechanisms. (16)
Or
(b) Discuss the issues and solutions in wireless security. (16)

2 51158

PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor

You might also like