0% found this document useful (0 votes)
47 views2 pages

B.E/B.Tech - Unit Test Iii Examination

1) The document is an exam for a Cryptography and Network Security course, assessing students' knowledge on various topics related to network and web security. 2) It contains two parts - Part A consists of 10 short answer questions worth 2 marks each. Part B consists of 3 long answer questions worth 10 marks each, with students required to choose 1 out of 2 questions. 3) The questions assess different levels of knowledge from remembering to applying and analyzing, and cover topics like intruders, firewalls, Kerberos, viruses, Secure Electronic Transaction (SET) protocol, X.509 authentication, and Intrusion Detection Systems.

Uploaded by

sharmila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views2 pages

B.E/B.Tech - Unit Test Iii Examination

1) The document is an exam for a Cryptography and Network Security course, assessing students' knowledge on various topics related to network and web security. 2) It contains two parts - Part A consists of 10 short answer questions worth 2 marks each. Part B consists of 3 long answer questions worth 10 marks each, with students required to choose 1 out of 2 questions. 3) The questions assess different levels of knowledge from remembering to applying and analyzing, and cover topics like intruders, firewalls, Kerberos, viruses, Secure Electronic Transaction (SET) protocol, X.509 authentication, and Intrusion Detection Systems.

Uploaded by

sharmila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Register Number:

B.E/B.TECH – UNIT TEST III EXAMINATION


III Year / IV Semester (Batch 2017 – 2021)
16IT605-CRYPTOGRAPHY AND NETWORK SECURITY
(INFORMATION TECHNOLOGY)
Date & Time: 28/04/2020 & 3.00 PM – 4.30 PM Maximum: 50 Marks
Part A – (10 x 2 = 20 marks)

1. CO4 Define Intruder. K1


2. CO4 K1
What is Kerberos? What are its uses?
3. CO4 K2
List out the types of firewalls.
4. CO4 K1
What is a trusted system?
5. CO4 K3
Justify How firewall helps in network security?
6. CO4 K1
What are the types of intruders?
7. CO4 K1
Define honey pots.
8. CO4 Enumerate the types of viruses. K3
9. CO4 List the new elements that are used in Kerberos V5. K2
10 CO4 Define Distributed Denial of Service (DDOS) attack. K1
. PART B - (3 x 10 = 30 marks)
11.(a) CO4 What is Secure Electronic Transaction (SET) protocol? Explain SET protocol for
K1 (10)
E-Commerce transactions.
(Or)
(b) CO4 Explain about X.509 authentication service in detail. Also list out the drawbacks K2 (10)
of X.509.

12.(a) CO4 Assume a client C wants to communicate with server S using Kerberos protocol. K4 (10)
How it can be achieved? (Or)
(b) CO4 K1 (10)
What is a firewall? Explain about the Design principles of Firewall.

13.(a) CO4 Elaborate about viruses and related threats along with its countermeasures in
K3 (10)
detail.
(Or)
(b) CO4 Explain about the types of Intrusion Detection System in detail. K2 (10)
Course Outcome To study about the Web Security measures, firewall techniques and Viruses.
Knowledge Level (K) Remember (K1), Understand (K2), Apply (K3), Analysis (K4), Evaluate (K5) & Design (K6)

Prepared By Verified By Approved By

Mrs.M.Sharmila Ms.N.Valarmathi Dr.R.Punithavathi

[AP /IT] [AP /IT] [HOD /IT]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy