1. (a) Mention the three functional areas of IP-Level security?
in
IV B.Tech I Semester Examinations,May 2011 INFORMATION SECURITY Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????
[4+12]
ld .
(b) Discuss in detail the basic combinations of security associations?
2. (a) Differentiate between Public key cryptography and Digital signature with relevant examples. (b) Compare version 4 with version 5 of Kerberos.
[8+8]
or
3. (a) What is a bastion host? List the common characteristics of a bastion host?
(b) Explain the concept of reference monitor in detail with a neat sketch? [8+8] 4. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing, IP hijacking and brute-force attacks to web security? [16]
uW
5. (a) What is PGP? Explain how e-mail security is assured using PGP. (b) Write about S/MIME.
[8+8]
6. (a) List and describe the Security Mechanisms given in X.800 in detail. (b) What is Stack dumping? Explain how to create code for Buffer overflow to exploit any of the platforms. [8+8] 7. (a) Explain the following in relation with Cipher block modes of operation:
nt
i. Cipher Block Chaining (CBC) ii. Cipher Feedback (CFB)
(b) Write about HMAC.
[8+8]
Aj
8. (a) What are the elements that make up the VACM? Discuss (b) Discuss about the password scheme adopted in UNIX? ?????
1
[8+8]
Code No: R05411206
R05
Set No. 4
in
IV B.Tech I Semester Examinations,May 2011 INFORMATION SECURITY Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) What is PGP? Explain how e-mail security is assured using PGP.
[8+8]
ld .
(b) Write about S/MIME.
2. (a) List and describe the Security Mechanisms given in X.800 in detail.
(b) What is Stack dumping? Explain how to create code for Buffer overflow to exploit any of the platforms. [8+8]
or
3. (a) Mention the three functional areas of IP-Level security?
(b) Discuss in detail the basic combinations of security associations?
[4+12]
4. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing, IP hijacking and brute-force attacks to web security? [16]
uW
5. (a) What is a bastion host? List the common characteristics of a bastion host? (b) Explain the concept of reference monitor in detail with a neat sketch? [8+8] 6. (a) What are the elements that make up the VACM? Discuss (b) Discuss about the password scheme adopted in UNIX?
[8+8]
7. (a) Explain the following in relation with Cipher block modes of operation:
nt
i. Cipher Block Chaining (CBC) ii. Cipher Feedback (CFB)
(b) Write about HMAC.
[8+8]
Aj
8. (a) Differentiate between Public key cryptography and Digital signature with relevant examples. (b) Compare version 4 with version 5 of Kerberos. ?????
2
[8+8]
Code No: R05411206
R05
Set No. 1
in
IV B.Tech I Semester Examinations,May 2011 INFORMATION SECURITY Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) List and describe the Security Mechanisms given in X.800 in detail.
ld .
(b) What is Stack dumping? Explain how to create code for Buffer overflow to exploit any of the platforms. [8+8] 2. (a) What is PGP? Explain how e-mail security is assured using PGP. (b) Write about S/MIME.
[8+8]
or
3. (a) Mention the three functional areas of IP-Level security?
(b) Discuss in detail the basic combinations of security associations?
[4+12]
4. (a) What are the elements that make up the VACM? Discuss (b) Discuss about the password scheme adopted in UNIX?
[8+8]
uW
5. (a) Differentiate between Public key cryptography and Digital signature with relevant examples. (b) Compare version 4 with version 5 of Kerberos.
[8+8]
6. (a) What is a bastion host? List the common characteristics of a bastion host? (b) Explain the concept of reference monitor in detail with a neat sketch? [8+8] 7. (a) Explain the following in relation with Cipher block modes of operation:
nt
i. Cipher Block Chaining (CBC) ii. Cipher Feedback (CFB)
(b) Write about HMAC.
[8+8]
Aj
8. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing, IP hijacking and brute-force attacks to web security? [16] ?????
3
Code No: R05411206
R05
Set No. 3
in
IV B.Tech I Semester Examinations,May 2011 INFORMATION SECURITY Common to Information Technology, Computer Science And Systems Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) List and describe the Security Mechanisms given in X.800 in detail.
ld .
(b) What is Stack dumping? Explain how to create code for Buffer overflow to exploit any of the platforms. [8+8] 2. (a) What are the elements that make up the VACM? Discuss (b) Discuss about the password scheme adopted in UNIX?
[8+8]
or
3. (a) Differentiate between Public key cryptography and Digital signature with relevant examples. (b) Compare version 4 with version 5 of Kerberos.
[8+8]
4. (a) Mention the three functional areas of IP-Level security?
uW
(b) Discuss in detail the basic combinations of security associations?
[4+12]
5. (a) Explain the following in relation with Cipher block modes of operation: i. Cipher Block Chaining (CBC) ii. Cipher Feedback (CFB) (b) Write about HMAC.
[8+8]
6. (a) What is a bastion host? List the common characteristics of a bastion host?
nt
(b) Explain the concept of reference monitor in detail with a neat sketch? [8+8] 7. Discuss the features of SSL that counters man-in-the-middle attack, IP spoofing, IP hijacking and brute-force attacks to web security? [16]
Aj
8. (a) What is PGP? Explain how e-mail security is assured using PGP. (b) Write about S/MIME.
(b) Discuss in detail the basic combinations of security associations? [4+12] · 2. (a) Differentiate between Public key cryptography and Digital signature with rel-.
[16] · 4. What are channel,circuit and half circuit in the context of satellite telemetry sys- .... 3. Describe the conditions for total internal reflection within a fibre. [16].
(b) Describe a DC Servo Motor with a neat sketch. [8+8] · 4. (a) What is a timing belt? Discuss the use of Timing belts in power transmission? (b) Discuss various ...
(b) Consider any two networks of your choice which support Circuit switching or ... (b) Which is more efficient, circuit switching or packet switching? Why?
(a) What is the difference between logical I/O and device I/O? (b) Explain feed back scheduling policy. [8+8] · 2. (a) How can logical address space be ...
kerosene, and fuel oil must be limited as also shown in this table. There are no ... equipment is a function of x, the size (horsepower ) of the motor, namely.
(b) What is meant by displacement function? (c) Give the importance of Pascal Triangle. [4+6+6] · 3. Determine the displacements at nodes and the stresses in ...
The horizontal distance between u/s face and center line of drain holes is 8 m. ... (c) Cut-off trench ... Bed width of parent channel U/S / D/S = 45 m/40 m. [16].
Also draw the relevant circuit diagram. (b) Draw the resistive model of a CMOS inverter and explain its behavior for. LOW and HIGH outputs. [8+8]. 8. (a) It is necessary to identify the position of mechanical disk, when rotates with a step of 450. Gi
4. Give the syntax for 'awk'. Discuss about the selection criteria in awk. How to · embed action in to this command. Explain with examples. [16] · 5. Write about different Unix locking techniques. [16] · 6. (a) What are the differences between shell
of Rs. 1,500 would be deposited in this fund under an ordinary annuity plan. All · money in the fund can be .... (b) Discounted cash flow · (c) Net present worth ... would last for 10 years. A worn-out storage tank of capacity equivalent to the new.
R05. Set No. 2. III B.Tech I Semester Examinations,May 2011 · WEB TECHNOLOGIES · Information Technology ... that describes your college. The paragraph ...
(b) What is the necessity of heat treatment after carburizing? Explain. On what ... (b) What is the difference in heat treatment between 18% Ni and the 25% Nickel.
is subjected to a load of 200 kN, find the stresses developed in the two materials. ... Compare the values of max. and minimum hoop stresses for a cast steel ...
The cores of two identical transformers A and B carry alternating fluxes whose instantaneous values are (0.01 sin 314t)W and 0.012 (1.1 sin 628t+0.1 sin 1884t).
(a) Explain live node, E-node and dead node with an example. (b) Explain the method of reduction to solve TSP problem using Branch and · Bound. [8+8] · 3. (a) Prove that Prim's algorithm finds a minimum spanning tree. (b) Explain the single source sh
at 0.8 p.f. lagging and 15A at 0.6 p.f. lagging respectively, both expressed ... (b) A single-phase motor takes a current of 10 amps at a p.f. of 0.707 lagging.
If the tensile stress is not to exceed 17MPa, find the safe. u.d.l. which the beam can carry. Also find maximum compressive stress. Draw the sketch showing the ...