Network Security
Network Security
(CO-2)
Roll No. .................. 180862/170762/
a) RSA b) DES
120862/030865
6th Sem / Computer Engg. c) IREA d) RCS
Subject : Network Security Q.6 VPN stand for _______. (CO-7)
a) Visual Public Network
Time : 3 Hrs. M.M. : 100
b) Virtual Public Network
SECTION-A
Note: Multiple choice questions. All questions are c) Virtual Private Network
compulsory (10x1=10) d) Visual Private Network
Q.1 The field that covers the variety of computer Q.7 “parity bits” are used for which of the following
network, both public and private, that used in purposes? (CO-3)
everyday job? (CO-1) a) Encryption of data b) To transmit faster
a) Artificial Intelligence c) To detect errors d) To identify the user
b) ML Q.8 Firewalls are used for _________ (CO-4)
c) IT a) Routing
d) Network Security b) Security
Q.2 Which one of the following is a key function of c) Unauthorized access
Firewall? (CO-4) d) Congestion control
a) Copying b) Moving
Q.9 RAID stands for (CO-8)
c) Deleting d) Monitoring
a) Redundant array of independent disks
Q.3 SSL provides ________ (CO-2)
a) Message integrity b) Confidentially b) Reading array of independent disks
c) Compression d) All of the above c) Redundant array of inter disks
Q.4 The protocol ‘POP’ stand for (CO-1) d) Redundant array of independent drives
a) Personal office protocol Q.10 ________ is used to validate the identity of the
b) Post office protocol Message sender to the recipient. (CO-2)
c) Privacy overall protocol a) Encryption b) Decryption
d) Privacy over protocol c) Digital Certificate d) None of these
(1) 180862/170762/ (2) 180862/170762/
120862/030865 120862/030865
SECTION-B Q.27 Differentiate between encryption and decryption of
Note: Objective type questions. All questions are data? (CO-2)
compulsory. (10x1=10) Q.28 Explain configuration policy of cyber assets. (CO-6)
Q.11 Define term security of data over internet. (CO-1) Q.29 Define digital certificate and IP Sec. (CO-2)
Q.12 What is IT Act 2000 amended 2008? (CO-1) Q.30 Define cycle redundancy check. (CO-2)
Q.13 Define virus Scanners. (CO-3) Q.31 What is application level virus scanner? (CO-3)
Q.14 What are the different types of encryption? (CO-2) Q.32 Write a note on configuration of required objects in
Q.15 Define PGP. (CO-2) VPN. (CO-7)
Q.16 Explain host. (CO-5) Q.33 Explain about network disasters. (CO-8)
Q.17 Define cyber crime. (CO-6) Q.34 What is process configuration? (CO-3)
Q.18 What is IDS? (CO-5) Q.35 What is ethical hacking explain it with example? (CO-1)
Q.19 Define VPN. (CO-7)
Q.20 Expand clustering. (CO-8) SECTION-D
Note: Long answer type questions. Attempt any two
SECTION-C questions out of three questions. (2x10=20)
Note: Short answer type questions. Attempt any twelve Q.36 What do you mean by heuristic scanners and also
questions out of fifteen questions. (12x5=60) explain deploying virus protection. (CO-3)
Q.21 Write down various features of IT Act 2000. (CO-1) Q.37 What are the types of firewall and its limitations? (CO-4)
Q.22 Explain the concept of encryption and decryption. Q.38 Write short note on the following:
(CO-2) a) Host based IDS set up (CO-5)
Q.23 What are the disposable policies in handling of cyber b) Disaster category (CO-8)
assets system? (CO-6) (Note: Course outcome/CO is for office use only)
Q.24 Explain IDS counter measures. (CO-5)
Q.25 Explain Digital signatures? (CO-2)
Q.26 Draw a neat diagram of VPN and explain it with
example. (CO-7)
(3) 180862/170762/ (4420) (4) 180862/170762/
120862/030865 120862/030865