Cyber 1
Cyber 1
in/index
Part A
[9*1=9]
Q.No Question
1 ----------------- algorithm transforms Cipher to plain text C01 [1] [K1]
2 The -------------------- methods provides a one time session key for two parties. C01 [1] [K2]
3 Protection against denial by one of the parties in a communication called---------------------- C01 [1] [K1]
4 Public key encryption is advantageous over Symmetric key because of ------------- C01 [1] [K2]
6 _____________ is another data hiding technique which can be used in conjunction C03 [1] [K2]
8 which among them has strongest wireless security? C05 [1] [K1]
1: W 2: WPA 3: WPA2
EP
4: WPA3
9 which of the following is not a field in x.509 certificates? C04 [1] [K2]
10 Recovering and analysing digital evidence from network resources is -------------------------. C04 [1] [K1]
Part B
1 of 3 10/21/24, 4:27 PM
Firefox https://camu.in/index
Q.No Question
5 Explain Active and passive attacks with an example C01 [5] [K1]
(or)
(or)
12.2 Illustrate the importance of Intruders and viruses. C04 [5] [K2]
(or)
14.1 In a RSA cryptosystem a particular A uses two prime numbers p = 13 and q =17 to generate C04 [5] [K2]
her public and private keys. If the public key of A is 35 and Message 12. Then find out the
private key of A and Ciphertext C.
(or)
14.2 Define S/MIME.What are the sunctions of S/MIME? C04 [5] [K2]
(or)
15.2 Compare stream cipher and block cipher C01 [5] [K1]
Part C
[5*8=40]
Q.No Question
16.1 Comment on wireless cyber attacks. C05 [8] [K2]
(or)
2 of 3 10/21/24, 4:27 PM
Firefox https://camu.in/index
(or)
18.1 Explain in details DES Algorithm and Compare with AES. C04 [8] [K2]
(or)
18.2 Describe the ECC Implementation in python programming C04 [8] [K2]
(or)
19.2 Explain the process of Key management in cryptography C01 [8] [K1]
20.1 Explain the Working of Kerberos Authentication protocol. C01 [8] [K2]
(or)
Level Competence level under revised Bloom’s Taxonomy Question Number Marks Allotted % of Marks
1 Remembering(K1) 1, 3, 5, 8, 10 9 11
3 of 3 10/21/24, 4:27 PM