0% found this document useful (0 votes)
24 views3 pages

Cyber 1

This document is a model examination paper for the M.Sc. Cyber Security program at AJK College of Arts and Science, focusing on Network Security and Cryptography. It includes multiple-choice questions, short answer questions, and detailed essay prompts covering various topics in network security, cryptography algorithms, and security protocols. The exam is structured into three parts with a total of 79 marks available.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views3 pages

Cyber 1

This document is a model examination paper for the M.Sc. Cyber Security program at AJK College of Arts and Science, focusing on Network Security and Cryptography. It includes multiple-choice questions, short answer questions, and detailed essay prompts covering various topics in network security, cryptography algorithms, and security protocols. The exam is structured into three parts with a total of 79 marks available.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Firefox https://camu.

in/index

AJK COLLEGE OF ARTS AND SCIENCE Roll No.:


MODEL EXAMINATION Set 1 Sem: Semester 3
Msc Cyber Security Date:
Time:3.9 hrs

Course: 23CYC09- PAPER 9: NETWORK SECURITY AND CRYPTOGRAPHY Mark(s):79

Part A
[9*1=9]

Q.No Question
1 ----------------- algorithm transforms Cipher to plain text C01 [1] [K1]

1: Encryption 2: Decryption 3: Either a or b


4: Neither a nor b

2 The -------------------- methods provides a one time session key for two parties. C01 [1] [K2]

1: Diffie hellman 2: AES 3: DES


4: RSA

3 Protection against denial by one of the parties in a communication called---------------------- C01 [1] [K1]

1: Authentication 2: Non Repudiation 3: Integrity


4: DoS

4 Public key encryption is advantageous over Symmetric key because of ------------- C01 [1] [K2]

1: Speed 2: Space 3: Key Exchange


4: Key Length

6 _____________ is another data hiding technique which can be used in conjunction C03 [1] [K2]

with cryptography for the extra-secure method of protecting data.


1: cryptography 2: steganography 3: chorography
4: tomography

7 The full form of SSL is---------------------------. C04 [1] [K2]

1: serial socket layer 2: secure socket layer 3: session socket layer


4: secure session layer

8 which among them has strongest wireless security? C05 [1] [K1]

1: W 2: WPA 3: WPA2
EP
4: WPA3

9 which of the following is not a field in x.509 certificates? C04 [1] [K2]

1: issuer name 2: serial modifier 3: issuer unique identifier


4: signature

10 Recovering and analysing digital evidence from network resources is -------------------------. C04 [1] [K1]

1: TCP Port scan 2: Network forensic 3: protocol analysis


4: web proxies

Part B

1 of 3 10/21/24, 4:27 PM
Firefox https://camu.in/index

AJK COLLEGE OF ARTS AND SCIENCE Roll No.:


MODEL EXAMINATION Set 1 Sem: Semester 3
Msc Cyber Security Date:
Time:3.9 hrs

Course: 23CYC09- PAPER 9: NETWORK SECURITY AND CRYPTOGRAPHY Mark(s):79


[6*5=30]

Q.No Question
5 Explain Active and passive attacks with an example C01 [5] [K1]

11.1 Discuss the characteristics of Firewall C05 [5] [K2]

(or)

11.2 Describe salient features of steganography C05 [5] [K1]

12.1 Briefly explain blowfish algorithm. C04 [5] [K2]

(or)

12.2 Illustrate the importance of Intruders and viruses. C04 [5] [K2]

13.1 Comment on x.509 Authentication service. C03 [5] [K2]

(or)

13.2 Write a note on Digital signature C03 [5] [K2]

14.1 In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate C04 [5] [K2]

her public and private keys. If the public key of A is 35 and Message 12. Then find out the
private key of A and Ciphertext C.

(or)

14.2 Define S/MIME.What are the sunctions of S/MIME? C04 [5] [K2]

15.1 Explain RSA algorithm in detail C01 [5] [K2]

(or)

15.2 Compare stream cipher and block cipher C01 [5] [K1]

Part C
[5*8=40]

Q.No Question
16.1 Comment on wireless cyber attacks. C05 [8] [K2]

(or)

16.2 Explain DSA Cryptographic algorithm in detail. C05 [8] [K2]

2 of 3 10/21/24, 4:27 PM
Firefox https://camu.in/index

AJK COLLEGE OF ARTS AND SCIENCE Roll No.:


MODEL EXAMINATION Set 1 Sem: Semester 3
Msc Cyber Security Date:
Time:3.9 hrs

Course: 23CYC09- PAPER 9: NETWORK SECURITY AND CRYPTOGRAPHY Mark(s):79


Q.No Question
17.1 Write a Short note on Quantum cryptography C05 [8] [K2]

(or)

17.2 State the importance of security audit C05 [8] [K2]

18.1 Explain in details DES Algorithm and Compare with AES. C04 [8] [K2]

(or)

18.2 Describe the ECC Implementation in python programming C04 [8] [K2]

19.1 Elucidate about DES Algorithm C01 [8] [K2]

(or)

19.2 Explain the process of Key management in cryptography C01 [8] [K1]

20.1 Explain the Working of Kerberos Authentication protocol. C01 [8] [K2]

(or)

20.2 Explain RC5 algorithm in detail. C01 [8] [K2]

Level Competence level under revised Bloom’s Taxonomy Question Number Marks Allotted % of Marks

1 Remembering(K1) 1, 3, 5, 8, 10 9 11

2 Understanding(K2) 2, 4, 6, 7, 9, 11, 12, 13, 70 89


14, 15, 16, 17, 18, 19, 20

3 of 3 10/21/24, 4:27 PM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy