Forgot Password?
Mobile number is now mandatory for the security of your account.
We've sent you a verification code on your mobile number. Please enter it here to set a new password.
We've sent you a verification code on your mobile number or email address. Please enter it here to set a new password.
Define the following term with respect to cryptography:
i) Cipher
Discuss the need and construction of a Dual-signature in a SET protocol.
Define the key features of SET protocol.
Explain different phases in a SSL Handshake protocol.
Mention the applications of IPSec.
Draw and explain the header format of ESP protocol.
Describe the SA parameters and SA selectors of a IPSec.
What is S/MIME? What are the functions of S/SMIME?
Briefly explain the header fields of MIME protocol.
Explain the PGP message generation and message reception technique.
Explain anye Three Active security attacks.
List the difference between Kerberos version 4 and version 5.
Write and explain the general format of a X.509 public key certificate.
iv) Strganography.
iii) Keyspace
Briefly explain the components of issue specific security policy.
i) Encryption
Explain substitution cipher technique. Discuss its weakness.
Describe any four attacks on a cryptosystem.
Define the following term with respect to intrusion detection system:
iv) Confidence value.
ii) False' negative
ii) False positive
i) Alert
Discuss port scanning and Vulnerability scanning tools.
Explain Host based intrusion detection system. Write its advantages and disadvantages.
Discuss content filter technology in a security.
Define any six design rules of Firewall.
Explain different categories of Firewalls according to their processing mode.
Write and define different levels of controls in a security Architecture.
Discuss various stages in a Incident response planning strategy.
Congratulations! Your trial of
is now active.
Let's catch up on a Zoom call and I'll help you craft a killer career plan! Bring your own coffee.
Sourabh Bajaj