Ins Papers
Ins Papers
1
Q.4) Attempt any THREE of the following. (12 Marks)
a) Convert the given plain test into cipher text using single columnar technique using
following data
Plain Text: INFORMATION SECURITY
Number of Columns: 06
Encryption Key: 326154
b) State difference between Firewall and Intrusion Detection System?
c) Describe the host-based intrusion detection system with suitable diagram.
d) Explain working principle of SMTP.
e) Find the output of the initial permutation box when the input is given in hexadecimal
as: 0x0002 0000 0000 0001
______________________
2
Sample Test Paper I
MSBTE Outcome based Curriculum
Scheme – I
Programme Name: Computer Engineering/Information Technology
Programme Code: CO/IF
Semester: Sixth
22620
Course: Network and Information Security
Marks: 20 Time:1 hour
Instructions:
1. All questions are compulsory
2. Illustrate your answers with neat sketches wherever necessary
3. Figures to the right indicate full marks
4. Assume suitable data if necessary
5. Preferably, write the answers in sequential order
__________________________
3
Sample Test Paper II
MSBTE Outcome based Curriculum
Scheme – I
________________________
4
21222
22620
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour
Marks
(i) Confidentiality
(ii) Accountability
(ii) Piggybacking
[1 of 4] P.T.O.
22620 [2 of 4]
(e) Differentiate between viruses & worms (Any two).
(iii) Patch
(b) Consider plain text “COMPUTER ENGINEERING” & convert given plain
text into cipher text using ‘Caesar Cipher’ with shift of position three - write
down steps in encryption.
(d) Define access control & explain authentication mechanism for access control.
22620 [3 of 4]
4. Attempt any THREE of the following : 12
_______________
P.T.O.
22620 [4 of 4]
22232
22620
3 Hours / 70 Marks Seat No.
Marks
(i) Cryptography
(ii) Cryptology
[1 of 4] P.T.O.
22620 [2 of 4]
(b) Define following with suitable example :
(i) DAC
(ii) MAC
(c) Differentiate between symmetric and asymmetric key cryptography. (any four
points)
(b) Convert plain text into cipher text by using Simple columner technique of the
following sentence :
(c) State any four difference between Firewall and Intrusion Detection System.
(a) Convert the given plain text, encrypt it with the help of Caesor’s cipher
technique.
(e) Find the output of the initial permutation box when the input is given in
hexadecimal as
(i) Assels
(ii) Vulnerability
(iii) Risks
_______________
P.T.O.
22620 [4 of 4]
23124
22620
3 Hours / 70 Marks Seat No.
Marks
1. Attempt any FIVE of the following : 10
(a) List any four virus categories.
(b) List any four biometric mechanisms.
(c) Define the following terms :
(i) Cryptography
(ii) Cryptanalysis
(d) Give examples of Active & Passive Attacks (two each).
(e) State the two types of firewall with its use.
(f) List two protocols in IP Sec. State its function.
(g) Classify the following cyber crime :
(i) Cyber terrorism against a government organization
(ii) Cyber – Stalking
(iii) Copyright infringement
(iv) Email harassment
[1 of 4] P.T.O.
22620 [2 of 4]
2. Attempt any THREE of the following : 12
(a) Explain basic principles of information security.
(b) Explain any two password attacks.
(c) Describe digital signature technique using message digest.
(d) Explain steganography technique with an example.
P.T.O.
22620 [4 of 4]
23242
22620
3 Hours / 70 Marks Seat No.
Marks
[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Define the following terms :
(i) Authentication
(ii) Authorization
(b) Convert plain text into cipher text by using simple columnar technique of the
following sentence :
ALL IS WELL FOR YOUR EXAM.
(c) Describe packet filter router firewall with neat diagram.
(d) Explain working of fingerprint mechanism and its limitations.
_______________
12425
22620
3 Hours / 70 Marks Seat No.
Marks
[1 of 4] P.T.O.
22620 [2 of 4]
(c) Draw and explain Host-Based intrusion detection system.
(iii) Patch
(d) Write a brief note on Firewall configuration and state its limitations.
(ii) Steganography
(iii) Keystroke
(i) Copyright
(ii) Patent
(iii) Trademark
_______________
P.T.O.
22620 [4 of 4]