0% found this document useful (0 votes)
52 views2 pages

Mca 3 Sem Cyber Security 2128 Summer 2019

This document contains an exam for a cyber security course. It includes 5 questions with multiple parts each. Question 1 has parts on denial of service attacks, ethics of computer security, social engineering, and security policies. Question 2 focuses on viruses, packet filters, circuit gateways, firewalls, and Trojan horses. Question 3 discusses host authentication, SMB implementation, RADIUS, and network administration tools. Question 4 is about cryptography, secret key cryptography, VPN authentication and authorization, digital signatures, and personal/network VPNs. Question 5 provides short questions on active attacks, proxies, mail transfer agents, and differentiating layer 2 and layer 3 VPNs.

Uploaded by

syed mohd zaki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views2 pages

Mca 3 Sem Cyber Security 2128 Summer 2019

This document contains an exam for a cyber security course. It includes 5 questions with multiple parts each. Question 1 has parts on denial of service attacks, ethics of computer security, social engineering, and security policies. Question 2 focuses on viruses, packet filters, circuit gateways, firewalls, and Trojan horses. Question 3 discusses host authentication, SMB implementation, RADIUS, and network administration tools. Question 4 is about cryptography, secret key cryptography, VPN authentication and authorization, digital signatures, and personal/network VPNs. Question 5 provides short questions on active attacks, proxies, mail transfer agents, and differentiating layer 2 and layer 3 VPNs.

Uploaded by

syed mohd zaki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

M.C.A.

- II Sem-III (Old)
MCA233 - Cyber Security Paper-III
P. Pages : 2 GUG/S/19/2128
Time : Three Hours *1577* Max. Marks : 80
_______________________________________ ______________________________
Notes : 1. All questions are compulsory and carry equal marks.
2. Draw neat and labelled diagram wherever necessary.
3. Avoid vague answers and write the answers relevant & specific to questions only.

1. Either
a) Explain in detail Denial of service attacks. 8

b) Write in detail about Ethics of computer security. 8

OR

c) What is social Engineering? Explain. 8

d) What are security policies? Explain. 8

2. Either
a) Define virus. Explain in detail about structure of virus. 8

b) Write a note on. 8

i) Packet filter.

ii) Circuit level Gateways.

OR

c) What is firewall? Explain its various rule sets. 8

d) Write a note on. 8

i) Application level filtering.

ii) Trojan Horse.

3. Either
a) Explain in detail Host to Host Authentication. 8

b) Write in detail about SMB implementation. 8

OR

c) Discuss in detail about RADIUS. 8

d) Explain in detail various Network administration tools. 8

GUG/S/19/2128 1 P.T.O
4. Either
a) What is cryptography? Explain secret – key cryptography. 8

b) Discuss in detail VPN Authentication and Authorization. 8

OR

c) Write a note on. 8

i) Digital Signature.

ii) Timestamps.

d) Explain in detail personal and network VPN. 8

5. Solve all the questions.

a) Write a note on Active Attacks. 4

b) Explain in brief about proxies. 4

c) Write a short note on Mail transfer agent. 4

d) Differentiate between Layer 2 and Layer 3 VPN. 4

****************

GUG/S/19/2128 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy