June 2024 022
June 2024 022
No. of Printed Pages : 3 MSEI–022 (b) Full form of PGP is pretty good privacy.
(c) Digital signature require the sender to use the
private key.
MASTER OF SCIENCE (INFORMATION (d) Encryption can ensure secrecy of data.
SECURITY)/P.G. DIPLOMA IN (e) The Private key of digital signature is used by
INFORMATION SECURITY
the sender.
(MSCIS/PGDIS) 2. Fill in the blanks : 5×1=5
Term-End Examination (a) The signal where the watermark is to be
June, 2024 embedded is called the ............. .
MSEI-022 : NETWORK SECURITY (b) Firewalls are often configured to block ..........
traffic.
Time : 2 Hours Maximum Marks : 50
(c) The ........... operates a certification scheme
Note : Section A : Answer all the questions. for ISMS auditors.
Section B : Answer any two of three (d) Algorithms for performing encryption and
questions. decryption are known as .......... algorithms.
Section C : Answer any two questions out of (e) Full Form of CHAP is .............
three long answer types questions.
3. Write short notes on the following : 5 × 2 = 10
SECTION–A
(a) Public Key Infrastructure
Answer all the questions. (b) Trojan Horses
1. Write True or False : 5×1=5 (c) Padding methods
(a) Network layer firewall work as a packet (d) Risk Analysis
Filter. (e) Routers.
P.T.O.
[3] MSEI-022 [4] MSEI-022
SECTION–B
Answer any two out of three questions:
2 × 5 = 10
4. Write in detail about “Keys” establishment and its
types. 5
5. Define Vulnerabilities, Threats attacks and controls
with suitable example of each. 5
6. Describe the type of IDSs and their limitations.
Why we need hybrid IDSs ? 5
SECTION–C
Answer any two questions out of three long answer
type questions : 2 × 10 = 20
7. “Cyber Crime Investigations are time-sensitive”.
Explain how ? 10
8. Explain Network layer Attack. Discuss Packet
Sniffing in detail. 10
9. Explain the application of Biometric technology in
detail.
10
***
P.T.O.