Flat 50% off on all training & certification courses. Limited time offer Explore courses

Use these filters to find papers

  Question
1
Differentiate between Crypography and Digital Signature This question has 0 answers so far.
1

(a) What are the various types of key management and protocols?



This question has 0 answers so far.
1

(a) Explain triple DES?



This question has 0 answers so far.
1

(a) What do you mean by digital signatures? Explain its standard also.



This question has 0 answers so far.
1

(b) Explain encryption techniques with example


This question has 0 answers so far.
1
Differentiate between Information security and Network security. This question has 0 answers so far.
1

(b) Explain the model for Internetwork security with neat diagram.

This question has 0 answers so far.
1

(a) What are the typical phases of a virus operation?

This question has 1 answers so far.
1
Write short note on Web security requirements. This question has 0 answers so far.
1
Write short note on TCP session and TCP sweeps. This question has 0 answers so far.
1
Write short note on Tunneling using IPSec. This question has 0 answers so far.
1
Differentiate between Block and Stream cipher. This question has 0 answers so far.
1
Differentiate between Virus, Worm and Trojan attack. This question has 0 answers so far.
1
Draw a neat ICMP Packet and explain. This question has 0 answers so far.
1
Explain SYN Flood in brief. This question has 0 answers so far.
1
Differentiate between Internet and Virtual private network This question has 0 answers so far.
1
Differentiate between SNMO V1 and SNMP V2 This question has 0 answers so far.
1
Differentiate between Symmetric and asymmetry cryptography This question has 0 answers so far.
1
Discuss the various attributes of information security. This question has 0 answers so far.
1
Discuss about Confidentiality, Integrity and availability. This question has 0 answers so far.
1
Explain RSA and SHA 1 technique using an example for each cryptographies technique. This question has 0 answers so far.
1
Discuss the IP spoofing Network attack. This question has 0 answers so far.
1
Discuss the DOS attach Network attack. This question has 0 answers so far.
1
Discuss the Teardrop attack Network attack. This question has 0 answers so far.
1
Discuss the various Network scanning tools in details. This question has 0 answers so far.
1
Discuss the various types of Firewalls. Explain cach of them in detail. This question has 0 answers so far.
0

(a) Define the following: -

(ii) Smurf Attacks




This question has 0 answers so far.
0

(a) Define the following: -

(i) Basic Port Scan 




This question has 0 answers so far.
0

(a) Define the following: -

(iii) ICMP






This question has 0 answers so far.
0

Answer the following questions briefly:-

(f) What is Bastion Host?






This question has 0 answers so far.
0

Answer the following questions briefly:-

c) What do you understand by Teardrop attacks?





This question has 0 answers so far.
0

Answer the following questions briefly:-

(d) Draw a neat architecture of Encapsulating Security Pay Load)(ESP)and explain. 




This question has 0 answers so far.
0

Answer the following questions briefly:-

(c) Explain MD5?



This question has 0 answers so far.
0

Answer the following questions briefly:-

(b) What is a network and its security threats?


This question has 0 answers so far.
0

Answer the following questions briefly:-

(a) What is Hash function?

This question has 0 answers so far.
0

(b) What are firewalls? Explain their types and design principal?

This question has 0 answers so far.
0

(a) Define SSL and explain the concepts used in SSL?


This question has 0 answers so far.
0

(b) Explain SNMP Architecture.


This question has 0 answers so far.
0

(a) What is SET. Explain key features of Secure Electronic transaction(SET).



This question has 0 answers so far.
0

(b) Explain the IP security Architecture.


This question has 0 answers so far.
0

(b) Explain transport mode and tunnel mode.


This question has 0 answers so far.
0

(b) What is RSA? Explain using example.



This question has 0 answers so far.
0

(b) Find private key/Public key pair in RSA using p=11, q=3.



This question has 0 answers so far.
0

(a) What are the different types of viruses?

This question has 0 answers so far.