Submit Search
Upload
B.sc . i.t.-sem..-v-net-copy-may-2017
•
0 likes
•
54 views
Y
YogeshDhamke2
Follow
B.sc . i.t.-sem..-v-net-copy-may-2017
Read less
Read more
Education
Report
Share
Report
Share
1 of 10
Download now
Download to read offline
Recommended
Cryptography for developers
Cryptography for developers
Kai Koenig
Ch34508510
Ch34508510
IJERA Editor
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
CSCJournals
Sunanda cryptography ppt
Sunanda cryptography ppt
Soma Subbama
Introduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
Cryptography
Cryptography
Suhepi Saputri
Ch02 classic nemo
Ch02 classic nemo
Samia Elsayed
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
Recommended
Cryptography for developers
Cryptography for developers
Kai Koenig
Ch34508510
Ch34508510
IJERA Editor
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
CSCJournals
Sunanda cryptography ppt
Sunanda cryptography ppt
Soma Subbama
Introduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
Cryptography
Cryptography
Suhepi Saputri
Ch02 classic nemo
Ch02 classic nemo
Samia Elsayed
Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
ijcisjournal
Cryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
Cryptography and applications
Cryptography and applications
thai
Cryptography and network security
Cryptography and network security
patisa
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
infosecedu
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
6.hash mac
6.hash mac
Virendrakumar Dhotre
Java Crypto
Java Crypto
phanleson
Iss lecture 2
Iss lecture 2
Ali Habeeb
Network security and cryptography
Network security and cryptography
RajKumar Rampelli
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019
Network Security
Network Security
Federal Urdu University
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
loyola ICAM college of engineering and technology
Network Security (Revised Syllabus) [QP / October - 2016]
Network Security (Revised Syllabus) [QP / October - 2016]
Mumbai B.Sc.IT Study
Network Security (Revised Syllabus) [QP / October - 2012]
Network Security (Revised Syllabus) [QP / October - 2012]
Mumbai B.Sc.IT Study
Security solutions in vlsi design
Security solutions in vlsi design
Raja pirian
R09 information security – ii
R09 information security – ii
అనిల్ జూలూరి
9 d55205 cryptography and network security
9 d55205 cryptography and network security
Vinod Kumar Gorrepati
Question bank cn2
Question bank cn2
sangusajjan
Network Security (Revised Syllabus) [QP / April - 2014]
Network Security (Revised Syllabus) [QP / April - 2014]
Mumbai B.Sc.IT Study
More Related Content
What's hot
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
ijcisjournal
Cryptography cse,ru
Cryptography cse,ru
Hossain Md Shakhawat
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
Cryptography and applications
Cryptography and applications
thai
Cryptography and network security
Cryptography and network security
patisa
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
infosecedu
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim
Cryptography- "A Black Art"
Cryptography- "A Black Art"
Aditya Raina
6.hash mac
6.hash mac
Virendrakumar Dhotre
Java Crypto
Java Crypto
phanleson
Iss lecture 2
Iss lecture 2
Ali Habeeb
Network security and cryptography
Network security and cryptography
RajKumar Rampelli
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
newbie2019
Network Security
Network Security
Federal Urdu University
What's hot
(14)
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES
Cryptography cse,ru
Cryptography cse,ru
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Cryptography and applications
Cryptography and applications
Cryptography and network security
Cryptography and network security
Cissp d5-cryptography v2012-mini coursev2
Cissp d5-cryptography v2012-mini coursev2
Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Cryptography- "A Black Art"
Cryptography- "A Black Art"
6.hash mac
6.hash mac
Java Crypto
Java Crypto
Iss lecture 2
Iss lecture 2
Network security and cryptography
Network security and cryptography
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
Network Security
Network Security
Similar to B.sc . i.t.-sem..-v-net-copy-may-2017
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
loyola ICAM college of engineering and technology
Network Security (Revised Syllabus) [QP / October - 2016]
Network Security (Revised Syllabus) [QP / October - 2016]
Mumbai B.Sc.IT Study
Network Security (Revised Syllabus) [QP / October - 2012]
Network Security (Revised Syllabus) [QP / October - 2012]
Mumbai B.Sc.IT Study
Security solutions in vlsi design
Security solutions in vlsi design
Raja pirian
R09 information security – ii
R09 information security – ii
అనిల్ జూలూరి
9 d55205 cryptography and network security
9 d55205 cryptography and network security
Vinod Kumar Gorrepati
Question bank cn2
Question bank cn2
sangusajjan
Network Security (Revised Syllabus) [QP / April - 2014]
Network Security (Revised Syllabus) [QP / April - 2014]
Mumbai B.Sc.IT Study
9 d57206b cryptography & network security
9 d57206b cryptography & network security
Vinod Kumar Gorrepati
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
BGS Institute of Technology, Adichunchanagiri University (ACU)
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
Mca3050 advanced computer networks
Mca3050 advanced computer networks
smumbahelp
Mca3050 advanced computer networks
Mca3050 advanced computer networks
smumbahelp
Network Security(MD5)
Network Security(MD5)
United International University
[Question Paper] Network Security (Revised Syllabus) [October / 2016]
[Question Paper] Network Security (Revised Syllabus) [October / 2016]
Mumbai B.Sc.IT Study
Bca smu solved assignments
Bca smu solved assignments
solved_assignments
Network Security (Revised Syllabus) [QP / April - 2015]
Network Security (Revised Syllabus) [QP / April - 2015]
Mumbai B.Sc.IT Study
Cs1355cns
Cs1355cns
palaniyandiAnand
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
FRSecure
Similar to B.sc . i.t.-sem..-v-net-copy-may-2017
(20)
Cs6004 cyber fofrensics_qb
Cs6004 cyber fofrensics_qb
Network Security (Revised Syllabus) [QP / October - 2016]
Network Security (Revised Syllabus) [QP / October - 2016]
Network Security (Revised Syllabus) [QP / October - 2012]
Network Security (Revised Syllabus) [QP / October - 2012]
Security solutions in vlsi design
Security solutions in vlsi design
R09 information security – ii
R09 information security – ii
9 d55205 cryptography and network security
9 d55205 cryptography and network security
Question bank cn2
Question bank cn2
Network Security (Revised Syllabus) [QP / April - 2014]
Network Security (Revised Syllabus) [QP / April - 2014]
9 d57206b cryptography & network security
9 d57206b cryptography & network security
8th Semester Computer Science (2013-June) Question Papers
8th Semester Computer Science (2013-June) Question Papers
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Mca3050 advanced computer networks
Mca3050 advanced computer networks
Mca3050 advanced computer networks
Mca3050 advanced computer networks
Network Security(MD5)
Network Security(MD5)
[Question Paper] Network Security (Revised Syllabus) [October / 2016]
[Question Paper] Network Security (Revised Syllabus) [October / 2016]
Bca smu solved assignments
Bca smu solved assignments
Network Security (Revised Syllabus) [QP / April - 2015]
Network Security (Revised Syllabus) [QP / April - 2015]
Cs1355cns
Cs1355cns
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
More from YogeshDhamke2
Tybscit sem v nov 2015
Tybscit sem v nov 2015
YogeshDhamke2
Software testing main
Software testing main
YogeshDhamke2
solve pratical and imp quseation and solution for bscit
solve pratical and imp quseation and solution for bscit
YogeshDhamke2
Network security main
Network security main
YogeshDhamke2
Most important questions_sem5
Most important questions_sem5
YogeshDhamke2
Hospital management synopsis
Hospital management synopsis
YogeshDhamke2
Hospital management synopsis
Hospital management synopsis
YogeshDhamke2
Basic tags
Basic tags
YogeshDhamke2
Asp.net main
Asp.net main
YogeshDhamke2
After effects data driven animation assets
After effects data driven animation assets
YogeshDhamke2
Advance java for bscit
Advance java for bscit
YogeshDhamke2
html tags
html tags
YogeshDhamke2
2016 sem 5 For tybscit
2016 sem 5 For tybscit
YogeshDhamke2
How.to.make.a.website.for.beginners
How.to.make.a.website.for.beginners
YogeshDhamke2
Updated black book ice cream parlour word file For TYBSCIT
Updated black book ice cream parlour word file For TYBSCIT
YogeshDhamke2
Updated black book ice cream parlour TYBSCIT Final year project in PDF
Updated black book ice cream parlour TYBSCIT Final year project in PDF
YogeshDhamke2
Project documentation format
Project documentation format
YogeshDhamke2
online-shopping-documentation-srs for TYBSCIT sem 6
online-shopping-documentation-srs for TYBSCIT sem 6
YogeshDhamke2
[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC IT
YogeshDhamke2
More from YogeshDhamke2
(19)
Tybscit sem v nov 2015
Tybscit sem v nov 2015
Software testing main
Software testing main
solve pratical and imp quseation and solution for bscit
solve pratical and imp quseation and solution for bscit
Network security main
Network security main
Most important questions_sem5
Most important questions_sem5
Hospital management synopsis
Hospital management synopsis
Hospital management synopsis
Hospital management synopsis
Basic tags
Basic tags
Asp.net main
Asp.net main
After effects data driven animation assets
After effects data driven animation assets
Advance java for bscit
Advance java for bscit
html tags
html tags
2016 sem 5 For tybscit
2016 sem 5 For tybscit
How.to.make.a.website.for.beginners
How.to.make.a.website.for.beginners
Updated black book ice cream parlour word file For TYBSCIT
Updated black book ice cream parlour word file For TYBSCIT
Updated black book ice cream parlour TYBSCIT Final year project in PDF
Updated black book ice cream parlour TYBSCIT Final year project in PDF
Project documentation format
Project documentation format
online-shopping-documentation-srs for TYBSCIT sem 6
online-shopping-documentation-srs for TYBSCIT sem 6
[[Srs]] online shopping website for TYBSC IT
[[Srs]] online shopping website for TYBSC IT
Recently uploaded
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
LigayaBacuel1
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
Celine George
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
phamnguyenenglishnb
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
pboyjonauth
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Dr.Ibrahim Hassaan
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
InMediaRes1
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
LeaCamillePacle
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
nelietumpap1
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
JhezDiaz1
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Jisc
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
SpandanaRallapalli
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
MIPLM
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Celine George
Recently uploaded
(20)
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
B.sc . i.t.-sem..-v-net-copy-may-2017
1.
54D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC 1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3D A1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB42 BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426B 6BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1 426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554 B426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46 DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4648 3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856A C3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE 3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856A B426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856 6BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46485 A1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4648 54D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46 D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4 4856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554 6AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA155 E66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA15 AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA Q.P. Code :
360900 (3 Hours) Total Marks : 100 Note :1) All questions are compulsory. 2) Make suitable assumptions wherever necessary and state the assumptions made. 3) Answers to the same question must be written together. 4) Numbers to the right indicate marks. 5) Draw neat labeled diagrams wherever necessary. 6) Use of Non-programmable calculators is allowed. 1. Attempt any two of the following: a) Write a note on Security mechanism b) What is Kerberos? Explain. c) Explain the SSL architecture and explain the SSL protocol stack. d) What is DDOS attack? What are the ways in which DDOS attack can be classified? 2. Attempt any three of the following: a. Give the difference between Symmetric and asymmetric encryption. b. Give the general structure of DES algorithm. Explain the various mode of operation. c. Explain the RSA cryptosystem. d. Explain Vigenere Cipher. Encrypt the following text using vigenere cipher with keyword MUMBAI "TOMORROW IS A NEW DAY" e. Define entropy. Explain the properties of entropy. f. What is cryptanalysis? Explain the cryptanalysis of DES 3. Attempt any three of the following: a. Explain the MD4 algorithm for message digest generation. b. Explain the digital signature standard. c. Explain the Diffie-Hellman key exchange algorithm d. What are the different cryptographic hash function criteria? e. What is key predistribution? Explain the concept. f. Write a note on Fail-stop signatures. 10 15 15 [TURN OVER] 8249BC3DB426BA1554D464856AE66AF9
2.
54D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC 1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3D A1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB42 BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426B 6BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1 426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554 B426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46 DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4648 3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856A C3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE 3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856A B426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856 6BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46485 A1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4648 54D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D46 D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D4 4856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554 6AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA155 E66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA15 AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA1554D464856AE66AF98249BC3DB426BA Q.P. Code :
360900 2 4. Attempt any three of the following: a. Describe the various security services. b. What is the various security attacks identified under the OSI security architecture? Explain. c. Explain the security mechanism defined by X.800. d. What is nonrepundiation? Explain with the help of an example. e. Explain the model for Network Security. f. Explain the challenges involved in establishing computer security. 5. Attempt any three of the following: a. How is the certificate processing carried out by S/MIME? b. What is PGP protocol used for? Explain its features. c. When is the user certificate revoked in X.509? Explain each scenario. d. Write a note on Compression in PGP. e. What are the three enhanced security services proposed for S/MIME? f. Explain the authentication procedures used by X.509. 6. Attempt any three of the following: a. What is ESP used for? Explain the ESP format in detail. b. Explain the basic combination of security association. What is the advantage of combining the security associations? c. What is SSL Record protocol? Explain its operations. d. State the areas where SET protocol can be used. Summarize the participants in SET system. e. Write a note on ISAKMP. f. Write a note on TLS. 7. Attempt any three of the following: a. Explain the various ways in which a password file can be protected. b. Explain the architecture of Distributed intrusion detection. c. What are malicious programs? Give its classification. d. Write a note on Trojan horse. e. What are firewalls? What are its characteristics? f. What the various firewall configurations possible? Explain any one in detail. ----------------------- 15 15 15 15 8249BC3DB426BA1554D464856AE66AF9
3.
94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541 D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A54126 A9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83E 5CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC C45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45 DC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D 3EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D942 B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D9420 3EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D942 DC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D9 45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9 9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45C 94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45 08FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC4 FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83ED 42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83E EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83 4A541268B83EDC45CA9D94208FFE42EA
4.
94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541 D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A54126 A9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83E 5CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC C45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45 DC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D 3EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D942 B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D9420 3EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D942 DC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D9 45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9 9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45C 94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45 08FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC4 FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83ED 42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83E EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83EDC45CA9D94208FFE42EA4A541268B83 4A541268B83EDC45CA9D94208FFE42EA
5.
C138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381 CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C 1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5E 0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE33 C0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389 CC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E 89FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC 389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC13 3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138 389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138 FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC1 C0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC 1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1C C138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1 8DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0 C2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC CDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FC DA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389F 381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE338 (3 Hours) [
Total Marks : 100 N.B.: (1) All questions are compulsory. (2) Make suitable assumptions wherever necessary and state the assumptions made. (3) Answer to the same question must be written together. (4) Numbers to the right indicate marks. (5) Draw neat labelled diagrams wherever necessary. (6) Use of Non-programmable calculators is allowed. 1. Attempt any two of the following :— (a) Explain the BIG BANG approach of testing. (b) Explain brainstorming process. (c) How to write good test case ? (d) What are the characteristics of good requirements ? 2. Attempt any three of the following :— (a) Define quality.Discuss the customer’s view of quality. (b) Differentiate between ‘Q’ organisation and ‘q’ organisation. (c) Describe any one software development model in detail. (d) What are the principles of software testing ? Discuss. (e) Define testing. Why testing is necessary ? (f) Explain VV model for testing with diagram. 3. Attempt any three of the following :— (a) What is boundary value testing ? List all the limitations of boundary value testing. (b) Explain the concept of equivalence class testing with an example. (c) Whatisdecisiontablebasedtesting.Whereitcanbeusedandlistthecomponents of decision based testing. (d) Differentiatebetweenstrongequivalenceclasstestingandweakequivalenceclass testing. (e) Discuss the advantages and disadvantages of decision table based testing. (f) Write the guidelines for boundary value testing. 4. Attempt any three of the following :— (a) What are the coverage criteria ? Explain the testing process of data flow. (b) Discuss the Data Flow anlysis anomalies. (c) Explain the concept of program graph with an example. (d) Describe metric based testing. (e) Discuss the fou steps method devised by McCabe to carry out basis path testing. (f) Write a short note on LOOP Coverage. 10 15 15 15 [ TURN OVER QP Code : 361100 381C8C5EE3389FCC0E1CC138DC2ECDDA
6.
C138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381 CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C 1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5E 0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE33 C0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389 CC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E 89FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC 389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC13 3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138 389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138 FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC1 C0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC 1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1C C138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1 8DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0 C2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC CDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FC DA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389F 381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE3389FCC0E1CC138DC2ECDDA381C8C5EE338 2 5. Attempt any
three of the following :— (a) What are the levels of testing ? Explain. (b) What is integration testing ? List all the integation testing strategies. Explain any one. (c) List all advantages and disadvantages of call graph integration testing. (d) Briefly explain the concept of system testing. (e) Define the tem‘Interaction’.DiscussTaxonomy o interactions. (f) Define Theads. What are the distinct levels of threads ? 6. Attempt any three of the following :— (a) Explain Object oriented testing. (b) Discusstherelationshipbetweencollaborationdiagramsandsequencediagrams. (c) How object oriented integration testing is different from object oriented testing. (d) Discuss the implications of composition and encapsulation. (e) Write a short note on class testing. (f) What is UML based system testing ? Explain. 7. Attempt any three of the following :— (a) DefineTest Policy.Explain the general content of Test Policy. (b) What isTest Plan ? What are the benefits ofTest Plan. (c) Describe the purpose ofTest Reports. (d) Explain benchmarking concept. Why it is requied ? (e) Differentiate between qualitative data and quantitative data. (f) Explain the concept of checklist. _____________ 15 15 15 QP Code : 361100 381C8C5EE3389FCC0E1CC138DC2ECDDA
7.
D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C 4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27 A4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC AA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1F EAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCA DEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADE ADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1 1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E9 C1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E945 1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94 ADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E EAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1 A4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4 E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEA 559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADE B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCAD D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCA 8822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FC Q.P. Code :
361200 (3 Hours) Total Marks : 100 Note :1) All questions are compulsory. 2) Make suitable assumptions wherever necessary and state the assumptions made. 3) Answers to the same question must be written together. 4) Numbers to the right indicate marks. 5) Draw neat labeled diagrams wherever necessary. 6) Use of Non-programmable calculators is allowed. 1. Attempt any two of the following: a) What are JSP elements? Explain directives in the category. b) Explain the role of interceptors in struts. c) What is progress bar in swing? Explain the importance of it with code specification. d) Explain the local and remote interface view strategy of EJB. 2. Attempt any three of the following: a. Explain about the creation of table in swing. b. Explain about the usage of JSplitPane component. c. Explain the concept of JColorChooser in brief. Add suitable illustration to it. d. "Swing Components are light-weight components"-Explain this statement. e. Explain how to create dialog boxes such as message box and input box. f. Explain about the creation of "Hierarchical Tree Structure" of swing. 3. Attempt any three of the following: a) What is CGI? What are the issues that it has? Explain. b) Explain the life cycle phases of Servlet. c) Write a Servlet that prints the reverse of the given number. d) Write an exhaustive note on "HTTP Session". e) How a Servlet does redirection of pages? Add suitable illustration to it. f) Write a Servlet to find the cube root of the given number. 4. Attempt any three of the following: a) Write the advantages of JDBC API. b) Explain how to insert dynamic values onto the backend table. Which subclass of Statement is used for the same? c) Explain how JSP works. d) Write ajsp to find the square root of the given number. Accept number through html e) Explain <jsp:usebean>, one of the action tags of JSP. f) Explain the term "Character Quoting Conversions". 10 15 15 15 [TURN OVER] 822C27AFC1FCADEAA4D1E94559B3D388
8.
D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C 4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27 A4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC AA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1F EAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCA DEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADE ADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1 1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E9 C1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E945 1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94 ADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E EAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1 A4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4 E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEA 559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADE B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCAD D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCA 8822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FCADEAA4D1E94559B3D388822C27AFC1FC Q.P. Code :
361200 5. Attempt any three of the following: a) What is JSF? Explain the features of JSF 2.0? b) Explain the concept of result interface. c) Write a short note on EJB container. d) What are the different types of EJB? Explain e) What is facelet? How it is controlled by facelet controller? f) What are the advantages of EJB? Explain. 6. Attempt any three of the following: a) What is Struts? Explain the application flow of MVC pattern of struts. b) Explain the role of OGNL in struts. c) Explain the relationship between hibernate application and the database. d) Give the code specification of hibernate.cfg.xml that holds the connection details of customer table of company database. e) Create a simple struts application that prints the result page from an appropriate action. f) Explain the significance of hibernate framework. 7. Attempt any three of the following: a) Explain the concept of Resource Injection. b) Draw and explain the architecture of web services. c) What are the contents of Java mail API? Explain. d) Explain the significance of JNDI. e) Write a session bean java source code to send the mail to the given recipient. f) How to access the web services that we created already? Explain the steps m creating the client. ----------------------- 2 15 15 15 822C27AFC1FCADEAA4D1E94559B3D388
9.
087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB79885 30087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D 430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D43 D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D43008 52D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D 552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D499 8552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C 988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39A 7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D B7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8 7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D 8552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1 2D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39A 430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39 087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C3 D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993 993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D499 C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D49 AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4 1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087 Q.P. Code : [
TURN OVER (3 Hours) [ Total Marks : 100 N.B. : (1) All questions are compulsory. (2) Make suitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together. (4) Numbers to the right indicate marks. (5) Draw neat labeled diagrams wherever necessary. (6) Use of Non-programmable calculators is allowed. 1. Answer any two of the following: (a) Explain Smbclient, smbmount commands with suitable example. (b) Exlplain the use of cron files. (c) Explain the concept of subnetting with example. (d) Write a short note on GRUB. 2. Attempt any three of the following: (a) Write the importance of rc scripts. (b) Explain the concept of runlevel used in Linux. (c) What is RAID? Write different types ofRAID. Explain various levels of RAID. (d) Write the purpose of any five directories of/ . (e) Write the basic steps used to boot the system. (f) Write the duties of system administrator. 3. Attempt any three of the following: (a) Explain the concept of NFS with suitable example. (b) What is CIDR ? Explain with suitable example. (c) Explain the concept of DHCP with example. (d) Write the advantages and disadvantages of NFS. (e) Explain any five NFS export options. (f) List various files used in Linux to add a system to network. Explain. 10 15 15 361301 3BB7988552D430087D4993C39AF1D834
10.
087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB79885 30087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D 430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D43 D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D43008 52D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D 552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D499 8552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C 988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39A 7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D B7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8 7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D 8552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1 2D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39A 430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39 087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C3 D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993 993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D499 C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D49 AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4 1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087D4993C39AF1D8343BB7988552D430087 Q.P. Code : 2 4.
Attempt any three of the following: (a) Write the steps to configure squid. (b) Explain how to optimize samba service? (c) Write the purpose of various NTP utility programs. (d) List options of the global section of samba configuration file. Also write the purpose of each. (e) List the secure services and explain them with suitable example if any. (f) Explain the scp and sftp services with suitable example. 5. Attempt any three of the following: (a) List and explain different types of Domain Name Servers. (b) Explain the working of POP3 and IMAP. (c) Explain any five directives of vsftpd.conf file. (d) Give example of zone file. Explain (e) List key components that are essential for email to work. Explain in short. (f) Write the advantages of vsftpd. 6. Attempt any three of the following: (a) Write the steps to configure mailman. (b) What is the purpose of MPM ? Explain different approaches to process creation and control. (c) Explain the directory block ofhttpd.conffile. (d) Write a SSI script that will display long listing of /root. (e) Explain the working of Apache web server. (f) Write a short note on content negotiation. 7. Attempt any three of the following: (a) List various commands used to manage the groups in Linux. Also write the purpose of each. (b) Explain how to optimize web service. (c) Explain with suitable example user creation using command. (d) Explain rpmquery command with options. (e) Explain with example how password of multiple users can be changed in a single operation. (f) What are the advantages of shadow password over traditional password system? ----------------------------- 15 15 15 15 361301 3BB7988552D430087D4993C39AF1D834
Download now