MCA Notes
MCA Notes
Q2
a. What is Cryptography? Explain Modular Arithmetic and Additive Inverse.
[08]
b. Explain Euclidean and Extended Euclidean Algorithm with an example. [07]
Q3
a. Explain Stream and Block Ciphers. Describe ECB and CBC modes. [08]
b. What is Mutual Authentication? Explain the use of Kerberos. [07]
Q4
a. What is Public Key Infrastructure (PKI)? Describe its components and
working. [08]
b. Explain various Hash Functions used for Integrity with examples. [07]
Q5
a. What is Intrusion Detection System (IDS)? Explain its types and
methods. [08]
b. Describe the Security requirements of databases and OS. Give relevant
examples. [07]
Q1 Answer the following
a. What are the functional requirements of security in an organization? [05]
(CO1, BL2)
b. Describe the working of the Euclidean algorithm with an example. [05]
(CO2, BL3)
c. What is PKI? Explain its components and uses. [05] (CO2, BL3)
d. Define SSL and explain its role in securing web communications. [05]
(CO3, BL2)
Q2
a. Explain Modular Arithmetic and its importance in cryptography. [08]
(CO1, BL3)
b. Discuss types of symmetric encryption algorithms and compare DES and
AES. [07] (CO2, BL2)
Q3
a. Explain MDC and HMAC algorithms with suitable examples. [08] (CO2,
BL3)
b. What are the different properties of hash functions? [07] (CO2, BL2)
Q4
a. What are different types of web attacks? Explain how SAML assertion
helps in web service security. [08] (CO3, BL3)
b. Write short notes on:
i. WS-Security
ii. Email security using S/MIME [07] (CO3, BL2)
Q5
a. What is a firewall? Explain any three types of firewall configurations. [08]
(CO3, BL2)
b. What are rootkits? Explain phone and TDSS rootkits in detail. [07] (CO4,
BL3)
Q1 Answer the following
a. What are the principles and services of information security? [05] (CO1,
BL2)
b. Explain the RSA algorithm with an example. [05] (CO2, BL3)
c. Define digital signature. How is it different from a handwritten signature?
[05] (CO2, BL2)
d. What are different types of firewalls and their characteristics? [05] (CO3,
BL2)
Q2
a. Explain symmetric and asymmetric key cryptography with examples. [08]
(CO1, BL3)
b. Describe the types of authentication and explain Kerberos Version 5. [07]
(CO2, BL3)
Q3
a. Describe the structure of a digital certificate (X.509) and explain how it
works. [08] (CO2, BL3)
b. Explain message integrity and list hash functions used. [07] (CO2, BL2)
Q4
a. Explain various email security mechanisms like PGP and S/MIME. [08]
(CO3, BL2)
b. What are browser attacks? How can web services be secured? [07] (CO3,
BL2)
Q5
a. What is intrusion detection? Compare statistical anomaly detection and
rule-based detection. [08] (CO3, BL3)
b. Explain database access control and security issues in operating systems.
[07] (CO4, BL2)