MCA
Code No. 839/0
FACULTY OF INFORMATICS t
M.C.A III Year II Semester Examination, May 2009
(old) ®
NETWORKS SECURITY
(Elective - 111)
Time : 3 Hours] [Max. Marks : 80
Answer one question from each unit.
All questions carry equal marks.
Unit -1
1. (a) Distinguish between active and passive attacks 4
(b) Write about possible attacks on Double DES
(c) Explain how the attack can proceed on Triple DES with 2 keys. 8
Or
2. Explain in detail the different PRNG's 16
Unit - 1
3. (a) Discuss about the applications of Public Key Crypto Systems. 4
(b) Distinguish between conventional Encryption and Public Key
Encryption. 4
(c) How does the concept of Public Key Encryption evolved?
or
4. (a) Explain in detail the RSA algorithm. 15
(b) List the four general categories of schemes for distribution of Public keys. 1
Unit - 111
5. (a) Briefly explain Diffie Hellman Key exchange algorithm. 8
(b) Write about Digital signature standard. 8
or
6. Explain the Kerberos authentication service 16
[P.7.0.
@ scanned with OKEN Scanner'TBRARY
"PG College Code No.D-0703/CBCS
vanthapur, Hyderabad. !*
FACULTY OF INFORMATICS
M.C.A. 2 (Years Course) Ill-Semester (CBCS) (Backlog) Examination, September- 2022
Subject: Network Security
Time: 3 Hours Max. Marks: 70
Note: Answer one question from each unit. All questions carry equal marks.
UNIT -1
1. a) What is Authentication? Give example.
b) Explain Man-In-the middle Attack Algorithm?
(OR)
2. a) Define Anonymity. Give example
b) Explain DoS and its types? YL
UNIT - II Q
3. a) Define Cryptography.
b) Explain Triple DES? \,
(OR)
4. a) What is key exchange? Give example 0
b) Explain Diffie-Hellman Algorithm?
UNIT - IL
5. a) What is MAC?
b) Explain SHA Algorithm?
ey"
b) Explain RSA Algorithm?
UNIT - IV \,
7. a) Define Interface.
b) Explain Digital certgicates and its types?
(OR)
6. a) What is Biometric Authenti
8. a) What is ROP A)piain with example?
b) Explay fon smart cards?
UNIT -V
9. a) What is Micro payments?
b) Explain IPSec?
(OR)
10. a) What is E-Cash?
b) Explain SSL with example?
@ scanned with OKEN Scannera BRARY
+ °.G. College
‘yderabad-1? Code No: E-15199/CBCS.
FACULTY OF INFORMATICS
M.C.A. (2 Years Course) Ill- Semester (CBCS) (Main) Examination, April/May 2023
Subject: Network Security
Time: 3 Hours Max. Marks: 70
Note: |. Answer one question from each unit. All questions carry equal marks.
II. Missing data, if any, may be suitably assumed.
Unit-1
1. a) Explain different types of Security attacks.
b) Discuss about general threats to Computer Networks.
(OR)
2. a) Briefly explain the DoS.
b) Describe the concept of worms.
Unit =
3. a) Explain the structure of AES.
b) Describe briefly about RSA algorithm.
(OR)
4. a) Explain various principles of Public Key Cryptography.
b) Discuss about Diffie-Hellman algorithm.
Unit — I
5. a) Describe the concept of MDS in detail.
b) Briefly explain the concept of Digital Signature,
(OR)
6. a) Discuss about MAC functions.
b) Briefly explain the DSA.
Unit -
7. a) Describe the concept of Digital Certificate and Certificate Authority.
b) Explain different types of Virtual Private Networks.
(OR)
8. a) Describe the concept of firewall configuration.
b) Briefly explain the application security using Smart cards.
Unit-V
9. a) Discuss the various types of tickets with Kerberos VS.
b) Explain the Secure Electronic Transaction in detail.
(OR)
10. a) Describe the concept of IP Sec.
b) Briefly explain the architecture of NET.
@ scanned with OKEN ScannerLIBRARY
p.G. Colledés x
x, Hyderaboan| Code No. D-0410
Aurora’s
Gamanthapu)
FACULTY OF INFORMATICS
M.C.A. (CBCS) IIl-Semester 2 Years Course (Main) Examination, April 2022
Subject: Network Security (E2)
Time: 3 Hours Max. Marks: 70
(Missing data, if any, may be suitably assumed)
Note: Answer any five questions from the following.
All questions carry equal marks.
4 a) Define integrity. (4)
b) Explain Types of attacks? (10)
2 a) What is Authorization? Give an example. (5)
b) Explain IP Spoofing? (9)
3° a) Whatis the key length of DES? (3)
b) Explain DES Algorithm? (14)
4 a) What is key distribution? (>)
b) Explain different types of Attacks? (9)
5 a) What is Hash Function? (4)
b) Explain MDS Algorithm? (10)
6 a) Define Digital Signature. (4)
b) Explain DSA Signature. (10)
7 a) Define Firewall's. (4)
b) Explain VPN's and its types? (10)
8 a) What is smart card? (4)
b) Explain Zero’ Knowledge protocol? (10)
9 a) Define Kerberos (4)
b) Explain about Kerberos Authentication? (10)
10 a) What is electronic payment system? i AD)
b) Explain Secure Electronic Transaction with example?
@ scanned with OKEN Scannera
Av !
HYDEG BAD. Code No 8619/4
FACULTY OF INFORMATICS
M.C.A. II Year Il - Semester (Main) Examination, July / August 2015
Subject: Computer Networks
Time: 3 Hours Max.Marks: 89
Note: Answer one question from each unit. All questions carry equal marks,
UNIT —1
1 Explain the layers of OSI model in detail.
OR
2 a) Whats line coding? Explain.
b) Explain RS - 232 Interface.
UNIT ~ 11
3 Explain
i) Bridge ii) Sllotted-ALOHA iii) CSMA/CD iv) Token Ring
OR
4 What is Error detection and correction? Using\CRC solve the problem for the given
message M= 101101101 and the pattern bits are P= 1011.
UNIT — III
5 a) Compare virtual circuits with datagram
b) What is routing algorithm?” Explain distance vector routing table router ‘C’ from
B(5,0,8,12,6,7) D(16,12,6,0,9,10) E(7,6,3,9,0,4) the measured delays to B,D and
E are 6,3 & 5 respectively for the following graph
OR
6 Explain: i) Sub netting ii) CIDR iii) OSPF
UNIT —1V ;
7 a) Explain TCP transmission policy.
b) What is crash recovery?
OR
8 a) Explain TCP header format.
b) What is congestion control? Explain any two techniques of congestion control.
UNIT—V
9 Explain the following
i) HTTP ii) WWW _ ii) PGP
OR
40 What is encryption and decryption and write RSA algorithm?
@ scanned with OKEN Scanner