This is a Question Papers of Mumbai University for B.Sc.IT Student of Semester - V [Network Security] (75:25 Pattern ). [Year - November / 2014] . . . Solution Set of this Paper is Coming soon . . .
1. N e t w o r k S e c u r i t y
Q u e s t i o n P a p e r ( N o v e m b e r – 2 0 1 4 ) [ 7 5 : 2 5 P a t t e r n ]
1 | Page
M u m b a i B . S c . I T S t u d y
F a c e b o o k | T w i t t e r | I n s t a g r a m | G o o g l e + | Y o u T u b e
– Kamal T.
Time: 2 ½ Hours Total Marks: 75
N.B.: (1) All Question are Compulsory.
(2) Make Suitable Assumptions Wherever Necessary And State The Assumptions Made.
(3) Answer To The Same Question Must Be Written Together.
(4) Number To The Right Indicates Marks.
(5) Draw Neat Labeled Diagrams Wherever Necessary.
Q.1 Attempt Any Two of The Question: (10 Marks)
(A) What is the principle behind One Time Pads? Why is it highly secure? (5)
(B) Explain the various ways of attack, such as known Plain-Text Attack? (5)
(C) What are the two basic ways of transforming Plain-Text into Cipher? (5)
(D) Explain the following principles of security:
(i) Non-Repudiation
(ii) Integrity
(5)
Q.2 Attempt Any Two of The Question: (10 Marks)
(A) Explain CFB (Cipher Feedback) Mode of Algorithms. (5)
(B) What are the features of blowfish algorithm? Explain the steps in Encryption process
using Blowfish Algorithm?
(5)
(C) Explain the Principles / Working of IDEA Algorithm. (5)
(D) Explain in detail the steps in each round of DES. (5)
Q.3 Attempt Any Two of The Question: (10 Marks)
(A) Compare Symmetric and Asymmetric Key Cryptography using their various
characteristics?
(5)
(B) What are the Key Requirement of Message Digest? (5)
(C) What is the difference between MAC and Message Digester? (5)
(D) Explain the concept of Digital of Digital Envelop? (5)
Q.4 Attempt Any Two of The Question: (10 Marks)
(A) Write short note on Private Key Management. (5)
(B) What is cross-certification? Why is it needed? (5)
(C) Describe the role of CA in Creation / Revocation of Digital Certificate. (5)
(D) Explain the steps in Creation of Digital Certificate. (5)
2. N e t w o r k S e c u r i t y
Q u e s t i o n P a p e r ( N o v e m b e r – 2 0 1 4 ) [ 7 5 : 2 5 P a t t e r n ]
2 | Page
M u m b a i B . S c . I T S t u d y
F a c e b o o k | T w i t t e r | I n s t a g r a m | G o o g l e + | Y o u T u b e
– Kamal T.
Q.5 Attempt Any Two of The Question: (10 Marks)
(A) What is buffer overflow attack on SSL? (5)
(B) What are the objectives of SET, how are they achieved? (5)
(C) Write a detailed note on VPN (Virtual Private Network). (5)
(D) What are the attacks on Packet Filter Firewall? (5)
Q.6 Attempt Any Two of The Question: (10 Marks)
(A) What is authentication token? Explain briefly, how it works? (5)
(B) Explain the password based authentication and the problems associated with it. (5)
(C) Explain the usage of smart cards in authentication. (5)
(D) Explain Shared Secret Method of mutual authentication. (5)
Q.7 Attempt Any Three From The Following: (15 Marks)
(A) What are the different types of Criminal Attack? (5)
(B) Discuss how Encryption happens in RC5? (5)
(C) Explain the working of SHA (Secure Hash Algorithm). (5)
(D) Explain PKCS#5 PBE (Password Based Encryption) Standard. (5)
(E) Explain the concept of NAT (Network Address Translation). (5)
(F) Write a detailed note on Biometric Authentication. (5)