B5.3-R4: NETWORK MANAGEMENT & INFORMATION SECURITY NOTE: 1. 2.

Answer question 1 and any FOUR from questions 2 to 7. Parts of the same question should be answered together and in the same sequence.

Time: 3 Hours 1. a) b) c) d)

e) f) g)

2. a) b) c)

3. a)

b) c)

4. a) b) c)

5. a) b)

Total Marks: 100

What are the password vulnerabilities and attacks? How one can protect their computer from Viruses, Worms and Trojan Horses? Differentiate between brute force and dictionary attack. IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address. What are the applications of IP Spoofing? Which are the services vulnerable to IP Spoofing? What are the differences between Symmetric and Asymmetric algorithms of Security? What are the Principles of Risk Management? Define the following two terms i) Screened Host Firewall System ii) Screened Subnet Firewall System (7x4)

What is authentication and authorization? Public-key cryptography refers to a cryptographic system requiring two separate keys. What are the weaknesses of public key cryptography? What are the threats and vulnerability? How to carry out threats and vulnerability identification? (4+6+8)

Security Policy is processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. What are the issues of Security Policy Implementation? The RC4 algorithm is stream cipher. Write down pseudo code of algorithm of RC4 and explain by taking suitable example. What is a network firewall? List the critical resources in a firewall? What can't a firewall protect against that don't go through the firewall? (5+6+7)

What is functionality of Biometric Authentication? What is multimodal Biometric Authentication? List and describe The steps of Risk Analysis. What are the advantages of E-mail over TLS as compared to traditional (unencrypted) e-mail? (6+8+4)

What is MD5? What are the differences between MD5 and SHA? What are a collision attack and a preimage attack? By drawing suitable diagram explain Virtual Private Network (VPN). What are the types of VPN? What are the pros and cons of VPN? (9+9)

B5.3-R4

Page 1 of 2

July, 2014

6. a) b) c)

7. a)

b)

How Cryptography System is characterized? What is Cryptanalysis? What are the security Services and Mechanism? Give relationship chart of Security Mechanism and Services? List the business requirements of Secure Electronic Transaction (SET). (5+8+5)

Public-Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. How does the Public Key Cryptography concept work? A Port Scanner is a software application designed to probe a servrer or host for open ports. What are the types of scanning & How to carry out scanning? (9+9)

B5.3-R4

Page 2 of 2

July, 2014

NIELIT BE5.3-R4 Network Management & Information Security SP-1 ...

NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. NIELIT BE5.3-R4 Network Management & Information Security SP-1.pdf. Open. Extract.

19KB Sizes 2 Downloads 162 Views

Recommend Documents

NIELIT B3.1-R4 Management Fundamentals & Information Systems ...
Sign in. Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect ...

NIELIT B3.1-R4 Management Fundamentals & Information Systems ...
... Technical Approach, Behavioral Approach and Socio-Technical Approach to ... NIELIT B3.1-R4 Management Fundamentals & Information Systems SP-3.pdf.

NIELIT C12-R4 Information Storage & Management SP-3.pdf ...
c) What are the Features and Benefits of Content Addressable Storage? (6+6+6). 4. ... Displaying NIELIT C12-R4 Information Storage & Management SP-3.pdf.

Download Security Risk Management: Building an Information ...
Information Security Risk Management Program from the Ground Up Full Books. Books detail. Title : Download Security Risk Management: q. Building an ...

NIELIT A9-R4 Data Communication & Network Technologies SP-3.pdf
2.10 Virtual private networks need not use real private WANs. Page 2 of 4 ... 3.8 Avoids collision on wireless networks H. Advanced mobile phone system.

Information & Network Security Jan 2018 (2010 Scheme).pdf ...
Mention the important features of Oakley algorithm. ,(05 ~arks). (. 8 a. Discuss the SSL protocol stack. b. Explain key features of SET. c. Describe the components ...

Information & Network Security July 2016 (2014 Scheme).pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

Network and information security 2013.pdf
There was a problem previewing this document. Retrying... Download. Connect more ... Network and information security 2013.pdf. Network and information ...

Network Security
[Read PDF] Network Security: Private. Communication in a Public ... Series in Computer Networking and Distributed). Best Online ... Information Technology Law.