0% found this document useful (0 votes)
10 views2 pages

June 2024 022

The document is an examination paper for a Master of Science and Post Graduate Diploma in Information Security, focusing on Network Security. It includes sections for true/false questions, fill-in-the-blanks, short notes, and detailed answers on topics such as keys establishment, vulnerabilities, and cyber crime investigations. The exam is structured into three sections with varying question types and marks allocation.

Uploaded by

ayush82635
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

June 2024 022

The document is an examination paper for a Master of Science and Post Graduate Diploma in Information Security, focusing on Network Security. It includes sections for true/false questions, fill-in-the-blanks, short notes, and detailed answers on topics such as keys establishment, vulnerabilities, and cyber crime investigations. The exam is structured into three sections with varying question types and marks allocation.

Uploaded by

ayush82635
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

[1] MSEI-022 [2] MSEI-022

No. of Printed Pages : 3 MSEI–022 (b) Full form of PGP is pretty good privacy.
(c) Digital signature require the sender to use the
private key.
MASTER OF SCIENCE (INFORMATION (d) Encryption can ensure secrecy of data.
SECURITY)/P.G. DIPLOMA IN (e) The Private key of digital signature is used by
INFORMATION SECURITY
the sender.
(MSCIS/PGDIS) 2. Fill in the blanks : 5×1=5
Term-End Examination (a) The signal where the watermark is to be
June, 2024 embedded is called the ............. .

MSEI-022 : NETWORK SECURITY (b) Firewalls are often configured to block ..........
traffic.
Time : 2 Hours Maximum Marks : 50
(c) The ........... operates a certification scheme
Note : Section A : Answer all the questions. for ISMS auditors.
Section B : Answer any two of three (d) Algorithms for performing encryption and
questions. decryption are known as .......... algorithms.
Section C : Answer any two questions out of (e) Full Form of CHAP is .............
three long answer types questions.
3. Write short notes on the following : 5 × 2 = 10
SECTION–A
(a) Public Key Infrastructure
Answer all the questions. (b) Trojan Horses
1. Write True or False : 5×1=5 (c) Padding methods
(a) Network layer firewall work as a packet (d) Risk Analysis
Filter. (e) Routers.
P.T.O.
[3] MSEI-022 [4] MSEI-022
SECTION–B
Answer any two out of three questions:
2 × 5 = 10
4. Write in detail about “Keys” establishment and its
types. 5
5. Define Vulnerabilities, Threats attacks and controls
with suitable example of each. 5
6. Describe the type of IDSs and their limitations.
Why we need hybrid IDSs ? 5
SECTION–C
Answer any two questions out of three long answer
type questions : 2 × 10 = 20
7. “Cyber Crime Investigations are time-sensitive”.
Explain how ? 10
8. Explain Network layer Attack. Discuss Packet
Sniffing in detail. 10
9. Explain the application of Biometric technology in
detail.
10
***

P.T.O.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy