0% found this document useful (0 votes)
31 views3 pages

MCA Notes

The document contains a series of questions related to Information Security, covering topics such as cryptography, digital signatures, firewalls, Public Key Infrastructure (PKI), and intrusion detection systems. Each question is designed to assess knowledge on principles, algorithms, and security mechanisms. The questions are structured to require explanations, comparisons, and examples to demonstrate understanding of the subject matter.

Uploaded by

godvenom2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views3 pages

MCA Notes

The document contains a series of questions related to Information Security, covering topics such as cryptography, digital signatures, firewalls, Public Key Infrastructure (PKI), and intrusion detection systems. Each question is designed to assess knowledge on principles, algorithms, and security mechanisms. The questions are structured to require explanations, comparisons, and examples to demonstrate understanding of the subject matter.

Uploaded by

godvenom2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q1.

Answer the following:


(All sub-questions carry 5 marks each)
a. Define Information Security. Explain its principles and services.
b. Differentiate between Symmetric and Asymmetric Cryptography with
examples.
c. Explain Digital Signature. How is it different from Public Key Cryptography?
d. Describe the concept and types of Firewalls.

Q2
a. What is Cryptography? Explain Modular Arithmetic and Additive Inverse.
[08]
b. Explain Euclidean and Extended Euclidean Algorithm with an example. [07]

Q3
a. Explain Stream and Block Ciphers. Describe ECB and CBC modes. [08]
b. What is Mutual Authentication? Explain the use of Kerberos. [07]

Q4
a. What is Public Key Infrastructure (PKI)? Describe its components and
working. [08]
b. Explain various Hash Functions used for Integrity with examples. [07]

Q5
a. What is Intrusion Detection System (IDS)? Explain its types and
methods. [08]
b. Describe the Security requirements of databases and OS. Give relevant
examples. [07]
Q1 Answer the following
a. What are the functional requirements of security in an organization? [05]
(CO1, BL2)
b. Describe the working of the Euclidean algorithm with an example. [05]
(CO2, BL3)
c. What is PKI? Explain its components and uses. [05] (CO2, BL3)
d. Define SSL and explain its role in securing web communications. [05]
(CO3, BL2)

Q2
a. Explain Modular Arithmetic and its importance in cryptography. [08]
(CO1, BL3)
b. Discuss types of symmetric encryption algorithms and compare DES and
AES. [07] (CO2, BL2)

Q3
a. Explain MDC and HMAC algorithms with suitable examples. [08] (CO2,
BL3)
b. What are the different properties of hash functions? [07] (CO2, BL2)

Q4
a. What are different types of web attacks? Explain how SAML assertion
helps in web service security. [08] (CO3, BL3)
b. Write short notes on:
i. WS-Security
ii. Email security using S/MIME [07] (CO3, BL2)

Q5
a. What is a firewall? Explain any three types of firewall configurations. [08]
(CO3, BL2)
b. What are rootkits? Explain phone and TDSS rootkits in detail. [07] (CO4,
BL3)
Q1 Answer the following
a. What are the principles and services of information security? [05] (CO1,
BL2)
b. Explain the RSA algorithm with an example. [05] (CO2, BL3)
c. Define digital signature. How is it different from a handwritten signature?
[05] (CO2, BL2)
d. What are different types of firewalls and their characteristics? [05] (CO3,
BL2)

Q2
a. Explain symmetric and asymmetric key cryptography with examples. [08]
(CO1, BL3)
b. Describe the types of authentication and explain Kerberos Version 5. [07]
(CO2, BL3)

Q3
a. Describe the structure of a digital certificate (X.509) and explain how it
works. [08] (CO2, BL3)
b. Explain message integrity and list hash functions used. [07] (CO2, BL2)

Q4
a. Explain various email security mechanisms like PGP and S/MIME. [08]
(CO3, BL2)
b. What are browser attacks? How can web services be secured? [07] (CO3,
BL2)

Q5
a. What is intrusion detection? Compare statistical anomaly detection and
rule-based detection. [08] (CO3, BL3)
b. Explain database access control and security issues in operating systems.
[07] (CO4, BL2)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy