Flat 50% off on all training & certification courses. Limited time offer Explore courses

Use these filters to find papers

  Question
0

Attempt any five of the following

(a) Differentiate between Symmetric Key (Private Key) and Asymmetric Key  (Public Key) cryptography

(b) Define the following terms

     (i) Cryptology

     (ii) Crypto analysis .

     (iii) Cyptography

(c) Explain the mechanism to provide Contedentiality in Pretty Good Privacy

(d) How does the anti replay service is implemented through All Protocol?

(e) Define the following term

(i) Virus     (ii) Trojan Horse     (iii) Warm

(f) Sender encrypts a messages m with Recapients Public RSA key (n = 35,e=5). The Cipher Text is 10. Determine the plain text. 

This question has 0 answers so far.
0

LIst all the participants in the Secured Electronic Transaction (SET) System Briefly explain the the sequence of events that are required for a SET.

This question has 0 answers so far.
0

Explain the architectors of IPSec. Explain Internet Security association Key Management Protocol

This question has 0 answers so far.
0

Explain how Authentication is achieved in Pretty Good Privacy (PGP). What is the use of ZIP algorithm and Radix-64 algorithim in PGP.

This question has 0 answers so far.
0

What are the three threats associated with user authentication over a network In the context of Kerberos what is a realm?

This question has 0 answers so far.
0

What is the purpose of X.509 Standard? How is an X.509 certificate revoked.

This question has 0 answers so far.
0

What problem wass Kerberos designed to address? What four requirements were defined for kerboros? 

This question has 0 answers so far.
0

Explain the following Security atracks

(i) Choosen Cipher Text a tack

(ii) Known Plain Text Atrack.

This question has 0 answers so far.
0

Explain the RSA algorithm .

This question has 0 answers so far.
0

 What is the use of a digital Signature?  How does a digital Signature differs from Hand written Signature? Explain the application of Public Key What is the use of a digital Signature?

This question has 0 answers so far.
0

Explain SNMP in detail. Define the term Threat, Risk and Vulnerability in the context of Systems security.

This question has 0 answers so far.
0
Different security attacks target different security services". Comment. This question has 0 answers so far.
0
Discuss network Security architecture. This question has 0 answers so far.
0
Discuss different types of firewall at different layers of TCPAP stack along with their advantages & disadvantages. This question has 0 answers so far.
0
What are 7 message types supported by SNMP to support 2-way communication between SNMP agent & SNMP manager. What is the difference between SNMP V1 & V3. This question has 0 answers so far.
0
Differentiate between transport & tunnel mode of A4 protocol. Draw A4header format along with the significance of each field to ensure message security. This question has 0 answers so far.
0
Define 2 web security threats? Describe the function of all the protocols in SSL stack. This question has 0 answers so far.
0
What is Kerberos? Discuss Kerberos V4 dialog along with the significance of each field in the message & use of authentication server. This question has 0 answers so far.
0
What is the significance of X.509 directory? Describe X.509 certificate formal Discuss four functions supported by the S/MIME protocol. This question has 0 answers so far.
0
Detail RSA key generation algorithm with an example, This question has 0 answers so far.
0

(a) What are the five principles of PGP?

This question has 0 answers so far.
0

(b) How does behavior blocking software work?

This question has 0 answers so far.
0

(a) What is packet filtering router 

This question has 0 answers so far.
0

(b) What are the phases operation of a virus?

This question has 0 answers so far.
0

(a) Explain the technique used by firewalls to control access and enforce a security policy. 

This question has 0 answers so far.
0

(b) What is SSL? Explain its architecture.

This question has 0 answers so far.
0

(a) List and define the SET Participants.

This question has 0 answers so far.
0

(b) Differentiate Tunnel Ind Transport maces in IPSec.

This question has 0 answers so far.
0

(a) What are the roles for the Oakley Key determination protocol and ISAKMP in IPSec?

This question has 0 answers so far.
0

(b) What four requirements were defined for Kerberos?

This question has 0 answers so far.
0
Differentiate between Security attacks Vs. malicious softwares. This question has 0 answers so far.
0

(b) What is the purpose of X.509 starcard?

This question has 0 answers so far.
0

{a) What is Kerberos? Discuss the single authentication dialog or Kerberos.

This question has 0 answers so far.
0

(b) Explain basic cryptographic principles.

This question has 0 answers so far.
0

(a) Explain playfair cipher with example.

This question has 0 answers so far.
0

(b) List and briefly define categories of Security Services and Mechanisms.

This question has 0 answers so far.
0

(a) Explain model of conventional Encryption.

This question has 0 answers so far.
0

 Attempt any five of the following: -

(a) What is the difference between Monoalphabetic cipher and polyalphabetic cipher?

(b) Explain RSA.

(c) What is S/MIME?

(d) What is a circuit-level gateway?

(e) What is Brute Force attack?

(f) What is a digital immune system? Is What is SNMP?:

This question has 0 answers so far.
0

What is a firewall and does it work? What is the difference between a Packet filter router and stateful inspection firewall.

This question has 0 answers so far.
0
What are digital signatures? Why they are used? This question has 0 answers so far.
0
What is SNMP? Explain SNMPv1 community facility. This question has 0 answers so far.
0
Discuss handshake protocol with complete diagram. This question has 0 answers so far.
0
What is SSL? Explain its architecture. This question has 0 answers so far.
0
Differentiate Tunnel and Transport modes in IPSec. This question has 0 answers so far.
0
Explain the Headers of IPv4 and IPv6. This question has 0 answers so far.
0
How Kerberos V4 differ from Kerberos V5? This question has 0 answers so far.
0
What is PGP? Discuss PGP as a confidential and authentication application. This question has 0 answers so far.
0
Explain various functions of S/MIME. This question has 0 answers so far.
0
What is Kerberos? Discuss the simple authentication dialog of Kerberos. This question has 0 answers so far.
0
What are firewalls? How do they work? Explain various types of firewalls. This question has 0 answers so far.
0
Explain RSA with an example. This question has 0 answers so far.
0
Differentiate between DEA and TDEA. This question has 0 answers so far.
0
Explain basic cryptographic principles. This question has 0 answers so far.
0
Write main benefits and services provided by IP sec. This question has 0 answers so far.
0
Explain the strategy used to store passwords in UNIX operating system. This question has 0 answers so far.
0
What is the difference between SMTP and MIME? This question has 0 answers so far.
0
Explain the format of X.509 authentication certificate using diagram only. This question has 0 answers so far.
0
What is key distribution? How can it be achieved? This question has 0 answers so far.
0
Discuss with illustrations the principle functions and concept of SNMP architecture in detail. How does it contribute to network management security? This question has 0 answers so far.
0
Differentiate between SSL VS. SET. This question has 0 answers so far.
0
Differentiate between Digital Vs. dual signature This question has 0 answers so far.
0
Differentiate between Symmetric Vs. asymmetric cryptography. This question has 0 answers so far.
0
Differentiate between S/MIME Vs. PGP. This question has 0 answers so far.
0
Write short notes on Digital signature. This question has 0 answers so far.
0
Write short notes on Discretionary access control and Mandatory access control. This question has 0 answers so far.
0
Write short notes on Web security/IP security. This question has 0 answers so far.
0
Write short notes on Virus and intruders. This question has 0 answers so far.
0
Write short notes on Information integrity. This question has 0 answers so far.
0
Explain various types of security attacks. This question has 0 answers so far.
0
What are the steps, which need to be taken care of order to protect your system from security threats? Classify with relevant examples. This question has 0 answers so far.
0
Internet has revolutionized the availability of information and commercial transaction. Al the same time it has deeply affected the soci a negatie way List the harms caused by abuse of Internet technology Discuss any three of them in detail. This question has 0 answers so far.
0
What do you understand by Cryptography? List the various cryptographic techniques with suitable illustrations. This question has 0 answers so far.
0
Specify and classify the different issues problems in firewall concept with its related advantages & limitations. Why anti-virus software or a firewall is not enough. Explain with proper examples. This question has 0 answers so far.
0
Examine and highlight the types and sources of network threats with examples. This question has 0 answers so far.
0
What is internet? Why do we need network Security and how can it be provided? Explain quoting suitable examples. This question has 0 answers so far.
0
What are viruses? Explain its various types. How viruses can be avoided while working on Internet? This question has 0 answers so far.
0
What is intrusion detection? Write some measures used for intrusion detection. This question has 0 answers so far.