17-05-2013, 02:49 PM
M C A - V Semester [R09] Regular/Supplementary Examinations, October - 2011
RegularSupplementary.pdf (Size: 27.38 KB / Downloads: 16)
1. a. Classify the security attacks based on whether any harm is done to data?
b. Explain the model for internetwork security with a neat diagram?
c. What are the steps involved in the execution of stack over flow attack?
2. a. Explain the various block cipher modes of operations?
b. Distinguish between link encryption and end-to-end encryption?
c. What characteristics are needed in a secure hash function?
3. a. Explain in detail, how Kerberos authentication protocol authenticates the user
and requested service each time?
b. Explain the use public-key encryption for the distribution of public keys?
4. a. Explain the functions provided by PGP?
b. List and explain the new content types introduced in MIME to include the
security services?
5. a. What is a security association ?Describe the parameters that uniquely identify
a security association?
b. Explain the weaknesses of Diffie – Hellman algorithm? How are they
encountered in Oakley protocol?
6. a. What are the fields present in SSL record protocol header? Mention their sizes
and purpose?
b. With a neat diagram explain various secure electronic commerce components?
7. a. Discuss in detail about network management architecture?
b. What are the deficiencies of SNMPV1?
c. Give a brief note of distributed network management?
8. a. List the characteristics of a good firewall implementation?
b. What are the advantages and disadvantages of using audit records for intrusion
detection?
c. What is a bastion host? List the common characteristics of a bastion host?