Você está na página 1de 2

KIST College

BIM
Semester 8
Pre-Board Exam
2016
Computer Security and Cyber Law
F.M.:60
P.M:24
Group-A [10x1]
Brief Answer Questions:
1. Which of the security violation occur when Harry copies Johns file.?
2. How does block cipher differ from stream cipher?
3. Define term DMZ.
4. What is virtual machine?
5. Define digital signature.
6. List any four design principles.
7. Define electronic contract.
8. What is VPN?
9. Encipher the plaintext KIST COLLEGE into cipher text using the transposition cipher.
10. What is the use of message authentication code (MAC)?

Group-B [6x5]
Short Answer Questions:
11. Define public key cryptography. Suppose p=7, q=11 and m=8 then find out public key,
private key and value of cipher text?
12. Define intrusion detection system and differentiate between statistical anomaly detection
and rule-based detection.
13. Define firewall and its type in brief. Also explain how firewall protects your network.
14. Differentiate term computer virus and computer worm in detail.
15. Describe following IT related topics in detail:
a) 3-DES
b) IPSec
c) SSL Handshake Protocol
16. Define digital forensics. Differentiate digital forensic with respect to computer security.

Group-C [2x10]
Long Answer Questions:

17. Differentiate symmetric key encryption and asymmetric key encryption in brief. Explain
DES encryption algorithm in detail with a support of required block diagram.
18. List common security related programming problems and explain any three of them in
detail.

Você também pode gostar