This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - V [Internet Security] (Old Syllabus). [Year - April / 2014] . . . Solution Set of this Paper is Coming soon . . .
[Question Paper] Internet Security (Old Syllabus) [April / 2014]
1. I n t e r n e t S e c u r i t y
Q u e s t i o n P a p e r ( A p r i l – 2 0 1 4 ) [ O l d S y l l a b u s ]
1 | Page
M u m b a i B . S c . I T S t u d y
F a c e b o o k | T w i t t e r | I n s t a g r a m | G o o g l e + | Y o u T u b e
– Kamal T.
Time: 3 Hours Total Marks: 100
N.B.: (1) Question No. 1 is Compulsory.
(2) Attempt any four questions from Q.2 – Q.7.
(3) Make suitable assumption whenever necessary and state the assumption made.
(4) Answers to the same questions must be written together.
(5) Numbers to the right indicate marks.
(6) Draw a neat labelled diagram and give example whenever necessary.
Q.1 Attempt The Following Question: (20 Marks)
(A) Logic Bombs (5)
(B) “Digging for Worms” (5)
(C) Filtering Services for DNS (5)
(D) PKC (Public Key Cryptography) (5)
Q.2 Attempt The Following Question: (20 Marks)
(A) Explain the principles of Security. (8)
(B) Explain Denial of Service Attack? What are the variations of the DOS Attack? Explain. (6)
(C) Describe the Life-Cycle of a Virus. (6)
Q.3 Attempt The Following Question: (20 Marks)
(A) Explain any of the Symmetric Cryptosystems Algorithm in detail. (8)
(B) Can the firewall store the dynamic state entries? If yes, what firewall does support the
same? Explain the characteristics of the same.
(6)
(C) What is Protocol Failure? Explain the loophole you identified in the protocols such as
TCP/IP and SSH.
(6)
Q.4 Attempt The Following Question: (20 Marks)
(A) What are Worms? How they spread onto your systems? What are the different types
of Worms? Explain the ways to eradicate them.
(8)
(B) Explain the different types of Firewall Configuration. (6)
(C) Explain the steps in implementing Digital Signature for your organization. (6)
2. I n t e r n e t S e c u r i t y
Q u e s t i o n P a p e r ( A p r i l – 2 0 1 4 ) [ O l d S y l l a b u s ]
2 | Page
M u m b a i B . S c . I T S t u d y
F a c e b o o k | T w i t t e r | I n s t a g r a m | G o o g l e + | Y o u T u b e
– Kamal T.
Q.5 Attempt The Following Question: (20 Marks)
(A) Explain Substitution and Transposition Cipher Techniques in detail. (8)
(B) Explain the characteristics, advantages and limitations of the firewall. (6)
(C) What is Trojan Horse Program? How they affect computer programs? Explain its types. (6)
Q.6 Attempt The Following Question: (20 Marks)
(A) Explain any of the Message Digest Algorithms. (8)
(B) What are the commonly used methods for “Authentication o users”? How is the
authentication failure observed in this?
(6)
(C) What is Security Policy? Explain them in detail. (6)
Q.7 Attempt The Following Question: (20 Marks)
(A) Compare Digital Signature and Digital Envelop. (5)
(B) Compare and contrast Symmetric and Asymmetric Cryptography. (5)
(C) Compare Active and Passive Attack. (5)
(D) Compare Distributed and Traditional Firewall. (5)