VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS

vtunotesbysree 7,489 views 49 slides May 19, 2018
Slide 1
Slide 1 of 49
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49

About This Presentation

VTU 8TH SEM CSE INFORMATION AND NETWORK SECURITY SOLVED PAPERS 10CS835


Slide Content

SOLVED PAPERS
OF
INFORMATION AND

NETWORK SECURITY
(JUNE-2014 JUNE-2015
JUNE-2016 8: JUNE-2017)

For Question Papers - www.knowledgeadda.com

ation mine 2083, wos ved mapa.

4.

pits re, op aa co ino neg
Se. ee re noe
A

CA a

Inport Note) Op
E

In 10CS/15835

Note: Answer FIVE full questions, selecting
at least TWO questions from each part.

©
LS ax
à. Dé an ISP ande componente > Nae. |
Win bb dra, plan be the mjor ses in coingenoyalbming. (Mer
% ES

a. Discuss the fern generations o fer. (os Mano)
À petita rk ot eva, OS tne

& Esplin te impleaon of Vinal Pate Nes (YBN) m irn mao
“ty, a Mars)

&

N Besser gu u on)
3. Describe the diferent IDPS Gin methode à 0 Mars)
wo

Explain Verna Ciphere with an Spe Go Mars)

D at un ob M)
Po
© B mr BY,

ar
«Bit os SA sud
Pb. Discuss the différence Ref Kerberos version 4 anferberos version 5. (08 Marks)
+ a né nn Hakim Da ane
Le RE rene, Ss

a. Explainth@aichitecture ofthe PS, als discus the role of ations. (10 Marks)
A > Aushentistion Headers implemented in Transport pme modes with a
O losers)

dB MD ann és
es ma ASE vd, Sr
2
..... A,
CMRIT LIBRARY te

BANOALORE. 500007.

poe eee

A te rer game on genre a

E
LF
©

oo Beas

Time: 3 hes,

Eon es mate

compita

Ay rin lec pl lora

DOWNLOAD VTUCANPUS ANDROID APP
AND GET ALL NOTES AND QUESTION PAPERS

Eighth Semester B.E. Degree Examination, June/July 2015
Information and Network Security

Not

inswer FIVE full questions, selecting

at least TWO questions from each part.

PART- A
Expiuin the characteristics of viable security policies
Discuss the components of sample issue specific policy.

a. Explain the dual homed host firewall,
b. Define firewall and explain al the firewall rules.

Explain the different types of 1DP systems.
Discuss measuring efictveness of IDPs
tie VTU CAMPUS

With an example, explain vernam ci I enerypting the plaintext
Expl the fren at on yp .-
LIN ONE VIU APP

PARTS
a Discuss the differen ative atacks

b. Explain the environmental shorcomings of Kerberos Va.
© With a diagram, explain the X-509 certificate format.

Fe

Using figure, explain how authentication is performed in PGP.
Explain the SIMIME functionality
Explain the MIME content types.

With diagram, explain basic combination of security associations
Explain the ISAKMP message exchange types.

En

Explain the handshake protocol action in SSL
Explain the key features of SET.
‘With a figure, discuss the dual signature construction.

ore

VTUCRMPUS.COM : DOWNLOAD ALL OTHER QUESTION PAPERS
FOR YOUR BRANCH AND SEMESTER

[I Í ] 10CS/18835

0 Mar
Km

(10 Marka)
0 Mans)

omar)
0 Mark)

10 Mark
6 Mar)

(ao Marks)
(8 Marks)

(Marks)

Go ans)
(05 Mars)
(OS Mars)

(ao Mars)
Mar)

(omar)
(OS Mars)
(OS Maris)

AAA

Apemensenmernen

IPR

sn 10CS/18835

Eighth Semester B.E. Degree Examination, June/July 2016
Information and Network Security

Time: 3 hrs Max. Marks;100
Note: Answer FIVE full questions, selecting é
‘at least TWO questions from each part.

PART-A

a. Briefly explain the components of sue specifi security policy. (©
b.. Discuss various stages in a Incident response planning strategy. CS
& Wei and define ferent evel ot ina security Arete

a. Explain different categories of Firewalls according to the ping mode
b. Define any six design rules of Firewall,
©. Discuss content fiter technology inasecuity. C2

3 a. Explain Host based intrusion detection system. Writ ts advantages and disadvantages.

. Discuss port scanning and Vulnerbiliy scp tool.
€. Define he following terms with respect te infrusion detection system:

FH
=
qe
És
Hi
#5
i 4) Alert i) False positive — li) False negative i) Confidence value. (Marks)
ÉL 4 a. Describe any four attacks on a chpiosysiem. ; (on ark)
1 Explain substitution cipher technique. Discuss ts weakness. Gars)
FL: Deine folowing ems breast to eyptogrpty:
+H ') Encryption i) Cipher i) Keyspace) Srganography. Gears)
El 1
FE 5 a write and explain the general format ofa X305 publi key certificate. (cements)
E Lis te cies been Kaas veran and ven Sera
BE. xpinany Tire Asie ect ck, sans)
Éd 6 = Exphfète PGP message generation and message reception technique. omens)
E Briefly explain the header fields of MIME protocol sans)
88€ Whatis SMIME? What ar the functions of SSMIME? Ci
fe

7 a. Describe the SA parameters and SA selectors ofa IPSec 0 Mar
E58 Dira and explain he header format of ESP protocol. Géants)
EE ce. Mention the applications of IPSec. ar
GU 8 a Explain dierent phases in a SSL Handshake protocol. (omar)
À Define the key features of SET protocol. coa
| ©. Discuss the need and construction ofa Du signature in a SET protocol, (06 Mano)

uw IL

Fighth Semester B.E. Degree Examination, June/July 202

Information and Network Security