21EC742
21EC742
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each
MODULE.
@#@
Page 01 of 02
21EC742
Model Question Paper-1/2 with effect from 2021(CBCS Scheme)
USN
Note: 01. Answer any FIVE full questions, choosing at least ONE question from each
MODULE.
@#@
Page 01 of 02
21EC742
Model Question Paper-1/2 with effect from 2021(CBCS Scheme)
USN
Note: 01. 02. Answer any FIVE full questions, choosing at least ONE question from each
MODULE.
03.
04.
*Bloom’s COs
Module -1 Taxonomy Marks
Level
Q.01 a Define security principle. Describe the four principles of security L1 CO1 10
in detail, each with an example.
b Interpret the active attacks and passive attacks in detail. L2 CO1 10
OR
Q.02 a List and explain the working of Anti-virus software and its
L1 CO1 10
generations.
b Illustrate with a block diagram, the model for Network Security
L2 CO1 10
and explain the Network Access Security model.
Module-2
Q. 03 a Draw the secure socket layer protocol stack and describe the L1 CO2 10
working in details.
b What is the importance of HTTPS? Explain the connection L1 CO2 06
initiation and closure of HTTP in detail.
c Interpret the calculation of HMAC in TLS L2 CO2 04
OR
Q.04 a Describe the overall operation of record protocol in SSL. Define
the various parameters associated with session state and L1 CO2 10
connection state of SSL Protocol.
b What is port forwarding and explain the types of port forwarding CO2
L1 06
.
c Illustrate the tasks performed by SSH connection protocol L2 CO2 04
Module-3
Q. 05 a List and explain about the IPSec documents. L1 CO3 05
b What are the benefits of IP Security. L1 CO3 05
c Outline the working of Transport and Tunnel modes.(encryption) L2 CO3 10
OR
Q. 06 a Write the applications of IPSec. L1 CO3 05
b Describe with neat diagram, illustrate the IP Security scenario. L1 CO3 05
c Explain the Internet Key Exchange using Diffie-Hellman L2 CO3 10
algorithm with an example.
Module-4
Q. 07 a Discuss the parts and phases of computer virus. L2 CO4 08
b Define the three classes of Intruders. Give examples of Intrusion. L1 CO4 12
Describe the Intruder behavior patterns with examples.
OR
@#@
Page 01 of 02
21EC742
Q. 08 a What is audit record? Explain its types and different fields in the CO4
L2 08
audit record.
b Write with a neat diagram, explain
(i)Distributed Intrusion detection
L1 CO4 12
(ii)Statistical Anomaly Detection
(iii) Rule-Based Intrusion Detection
Module-5
Q. 09 a Discuss the firewall configuration with neat diagram and example. L2 CO5 10
b Explain the four general techniques that the firewall use to control L2 CO5 05
access.
c With example , explain firewall configuration in DMZ Network L3 CO5 05
OR
Q. 10 a With a neat diagram, describe the working of packet filtering CO5
L2 10
firewall.
b Discuss the need for firewall and the techniques used. L2 CO5 05
c Classify are the firewall attacks and counter measures? L3 CO5 05
*Bloom’s Taxonomy Level: Indicate as L1, L2, L3, L4, etc. It is also desirable to indicate the COs and POs to be
attained by every bit of questions.
@#@
Page 02 of 02