Escolar Documentos
Profissional Documentos
Cultura Documentos
.C
O
EW
[8+8]
3. a) What is digital signature? List the approaches used to achieve secure user
authentication over a network internet.
b) Briefly describe public key distribution of secret keys.
[8+8]
[8+8]
[8+8]
[8+8]
O
R
LD
*****
JN
TU
1 of 1
Set No: 2
.C
O
EW
O
R
LD
[8+8]
[8+8]
[8+8]
[8+8]
*****
JN
TU
1 of 1
Set No: 3
.C
O
EW
[8+8]
O
R
LD
4. a) Briefly describe header fields defined in MIME and the elements of MIME
specifications.
b) What is S/MIME? Briefly describe cryptographic algorithms used in S/MIME.
[8+8]
5. a) Briefly describe anti-replay service and integrity check value.
b) Briefly describe about ISAKMP exchanges.
[8+8]
6. a) Briefly describe the involved steps in the SSL record protocol transmission.
b) Briefly describe the approaches for web traffic security.
[8+8]
[8+8]
[8+8]
*****
JN
TU
1 of 1
Set No: 4
.C
O
EW
[8+8]
4. a) What is VeriSign certificate? Briefly describe the contents of trust flag byte.
b) Briefly describe the general structure of a private and public key ring.
[8+8]
O
R
LD
[8+8]
[8+8]
[8+8]
*****
JN
TU
8. a) What is packet filtering router? Briefly describe the weaknesses of packet filtering
firewall.
b) What is reference monitor? Briefly describe the concept of trusted systems. [8+8]
1 of 1