0% found this document useful (0 votes)
298 views1 page

TE Comp - ELECTIVE-II Information Security (310254 A)

The document is an exam paper that contains 4 questions about information security topics. It includes questions about the OSI security architecture, importance of computer security, types of security services, definitions of computer security, models for network security, types of security attacks, symmetric cipher models, cryptographic systems, cryptanalysis, types of attacks on encrypted messages, Playfair ciphers, and Hill ciphers.

Uploaded by

kartiknikumbh11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
298 views1 page

TE Comp - ELECTIVE-II Information Security (310254 A)

The document is an exam paper that contains 4 questions about information security topics. It includes questions about the OSI security architecture, importance of computer security, types of security services, definitions of computer security, models for network security, types of security attacks, symmetric cipher models, cryptographic systems, cryptanalysis, types of attacks on encrypted messages, Playfair ciphers, and Hill ciphers.

Uploaded by

kartiknikumbh11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Total No. of Questions : 4] SEAT No.

:
PA-10042 [Total No. of Pages : 1

3
0:3
[6009]-325

2:1
B.E. (Computer Engineering) (Insem.)

31
4/2 1
INFORMATION SECURITY

7
02
8 0 38
(2019 Pattern) (Semester - II) (Elective - II) (310254 A)
4.3 01
Time : 1 Hour] 8/0 [Max. Marks : 30
G P

Instructions to the candidates :


3.1 CE

1) Attempt Q.1 or Q.2, Q.3 or Q.4.


.18

2) Neat diagram must be drawn wherever necessary.


67

3) Assume suitable data if necessary.

3
0:3
10

:1
Q1) a) Explain OSI security Architecture with neat diagram. [6]

12
/04 71
b) Explain importance of Computer Security. [5]
23
8
/20

c) Explain types of Security services. [4]


.38 13

OR
0
08
7.1 GP

Q2) a) What is Computer Security? [6]


b) Discuss model for network security. [5]
CE
84

c) Explain different security attacks. [4]


6

:33
3.1

: 10

Q3) a) Explain Symmetric Cipher Model with diagram. [6]


10

12

b) Explain 3 types of Cryptographic system. [5]


/04 71
23

c) Write short note on Cryptanalysis. [4]


8
/20
.38 13

OR
0
08

Q4) a) Explain types of attacks on Encrypted messages. [6]


7.1 GP

b) Write short note on Playfair Cipher. [5]


CE
84

c) Explain about Hill Cipher. [4]


6
3.1


10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy