Você está na página 1de 4

Set No: 1

Code No: V3225/R07

.C
O

III B.Tech II Semester Regular & Supplementary Examinations, April/May - 2012


INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 Hours
Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*****
1. a) What is security mechanism? Briefly describe the relation between security
services and mechanisms.
b) What is an attack? Briefly describe ARP attacks.
[8+8]

EW

2. a) Compare and contrast different secure hash functions.


b) Briefly describe the strengths and weaknesses of DES algorithm.

[8+8]

3. a) What is digital signature? List the approaches used to achieve secure user
authentication over a network internet.
b) Briefly describe public key distribution of secret keys.
[8+8]

[8+8]

5. a) Briefly describe IP Security architecture.


b) Briefly describe about ISAKMP payload types.

[8+8]

6. a) Briefly describe payment processing technique in SET.


b) Briefly describe about the SSL architecture.

[8+8]

O
R
LD

4. a) Briefly describe public key management in PGP.


b) What is Canonical form? Briefly describe S/MIME functionality.

7. a) What is malicious software? Briefly describe the types of viruses.


b) Briefly describe any two common techniques used to protect a password file. [8+8]

*****

JN

TU

8. a) What is a firewall? Briefly describe the capabilities and limitations of firewall.


b) Briefly describe trusted systems.
[8+8]

1 of 1

Set No: 2

Code No: V3225/R07

.C
O

III B.Tech II Semester Regular & Supplementary Examinations, April/May - 2012


INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 Hours
Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*****
1. a) What is security service? Describe the various security services.
b) Briefly describe TCP session hijacking.
[8+8]

EW

2. a) What is encryption? Briefly describe the ingredients of a conventional encryption


scheme
b) What is codebook? With a neat diagram, briefly describe CFB mode.
[8+8]
3. a) What problem was Kerberos designed to address? Briefly describe Kerberos
system.
b) What is CA? Briefly describe Public-key certificates.
[8+8]

O
R
LD

4. a) What is PGP? Briefly describe the PGP Services.


b) What is detached signature? Why does PGP generate a signature before applying
compression, describe.
[8+8]

[8+8]

6. a) Briefly describe the parameters that define SSL session connection.


b) Briefly describe about transport layer security.

[8+8]

7. a) Briefly describe the distributed network management.


b) Briefly describe SNMP protocol architecture.

[8+8]

8. a) What is SOCKS? Briefly the components of SOCKS.


b) Briefly describe the different types of firewalls.

[8+8]

*****

JN

TU

5. a) What is IPSec? Briefly describe the benefits of IPSec.


b) Briefly describe the purpose of SA selectors.

1 of 1

Set No: 3

Code No: V3225/R07

.C
O

III B.Tech II Semester Regular & Supplementary Examinations, April/May - 2012


INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 Hours
Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*****
1. a) Briefly describe available methods of executing a payload.
b) What are format string vulnerabilities? How they can be fixed and exploited. [8+8]

EW

2. a) What is cryptography? Briefly describe the requirements for secure use of


conventional encryption?
b) What is one-way hash? With an example, describe one-way hash function. [8+8]
3. a) What is service? Briefly describe X.509 authentication services.
b) Briefly describe Diffie-Hellman key exchange scheme.

[8+8]

O
R
LD

4. a) Briefly describe header fields defined in MIME and the elements of MIME
specifications.
b) What is S/MIME? Briefly describe cryptographic algorithms used in S/MIME.
[8+8]
5. a) Briefly describe anti-replay service and integrity check value.
b) Briefly describe about ISAKMP exchanges.
[8+8]
6. a) Briefly describe the involved steps in the SSL record protocol transmission.
b) Briefly describe the approaches for web traffic security.
[8+8]

[8+8]

8. a) What is Bastion Host? Briefly describe characteristics of Bastion host.


b) What is Data Access Control? Briefly describe Access control structure.

[8+8]

*****

JN

TU

7. a) What is Alert protocol? Briefly describe the applications of SNMPV3.


b) Briefly describe key features of SET and SET participants.

1 of 1

Set No: 4

Code No: V3225/R07

.C
O

III B.Tech II Semester Regular & Supplementary Examinations, April/May - 2012


INFORMATION SECURITY
(Computer Science and Engineering)
Time: 3 Hours
Max Marks: 80
Answer any FIVE Questions
All Questions carry equal marks
*****
1. a) Briefly describe a model for network security with the help of a neat diagram.
b) What is a route table? Briefly describe the process of route table modification.[8+8]
2. a) What is cryptanalysis? Briefly describe the types of attacks on encrypted messages?
b) Describe in detail about triple DEA.
[8+8]

EW

3. a) What is chain of certificates? How is an X.509 certificate revoked?


b) Briefly describe the purpose of X.509 standard.

[8+8]

4. a) What is VeriSign certificate? Briefly describe the contents of trust flag byte.
b) Briefly describe the general structure of a private and public key ring.
[8+8]

O
R
LD

5. a) Briefly describe encapsulating a security payload.


b) Briefly describe the features of Oakleys key determination protocol.

[8+8]

6. a) What is WWW? What are the challenges web presents?


b) Briefly describe the dual signature in SET.

[8+8]

7. a) Briefly describe the user security model.


b) What is USM? Briefly describe cryptographic functions in USM.

[8+8]

*****

JN

TU

8. a) What is packet filtering router? Briefly describe the weaknesses of packet filtering
firewall.
b) What is reference monitor? Briefly describe the concept of trusted systems. [8+8]

1 of 1

Você também pode gostar