Code No: 07A60503

R07

Set No. 2

in

III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Discuss about

(b) security services (c) security mechanisms.

[16]

2. (a) Explain the rule-based intrusion detection?

[8+8]

or

(b) Discuss about data access control. 3. Explain the AES algorithm?

ld .

(a) security attacks

[16]

4. (a) What is Radix-64 format? Explain how both PGP and S/MIME perform the Radix-64 conversion is performed.

uW

(b) Describe the five principal services that Pretty Good Privacy (PGP) provides. [8+8] 5. (a) What are the web security considerations (b) What are the key features of SET?

(c) What are the elements involved in SET? Explain?

4+4+8]

6. (a) Discuss the key elements included in the model of network management used for SNMP?

nt

(b) Explain the functional enhancements made in SNMPV2 over SNMPV1. [8+8]

7. (a) How does the encapsulating security payload work? (b) How are the secure keys distributed in IPSec?

[8+8]

Aj

8. (a) Explain the procedure involved in RSA public-key encryption algorithm? (b) Explain what Kerberos is and give its requirements. ?????

1

[8+8]

Code No: 07A60503

R07

Set No. 4

in

III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Distinguish between a packet-filtering router and a stateful inspection firewall?

2. Explain the working of SSL protocol?

ld .

(b) ”One way to secure against Trojan horse attacks is the use of a secure, trusted OS”. Explain? [8+8] [16]

3. (a) What is IPSec authentication header? Explain? (b) Discuss the purpose of SA selectors?

or

4. (a) How does PGP use the concept of trust?

(b) Discuss the functions provided by S/MIME?

[8+8]

[8+8]

5. (a) With a neat diagram explain SNMPV3 message format with USM?

uW

(b) Discuss about the four generations of the anti virus software?

[8+8]

6. (a) What are the criteria used while designing the DES algorithm? (b) In AES, how the encryption key is expanded to produce keys for the 10 rounds. [8+8] 7. (a) In the context of Kerberos, what is a realm? Explain? (b) What are the requirements of public key cryptography?

[8+8]

nt

8. (a) How IP spoofing and session hijacking work? (b) Discuss the various types of security attacks?

Aj

?????

2

[8+8]

Code No: 07A60503

R07

Set No. 1

in

III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????

2. (a) Explain the key features of SET?

ld .

1. Explain the key distribution techniques in public key cryptographic algorithms? [16]

(b) What is SSL? Explain the advantages and disadvantages of SSL? 3. (a) How is IP security achieved? Explain.

[8+8]

(b) What are various applications of IP Security?

or

(c) Explain the features of Oakley?

[8+4+4]

4. (a) Compare and contrast the key management in PGP and S/MIME. (b) Write about how PGP messages are created.

[8+8]

uW

5. (a) What is the difference between an unconditionally secure cipher and a computationally secure cipher? (b) Briefly describe about the Strength of DES?

[8+8]

6. (a) Draw the figure indicating the relationship among the different versions of SNMP by means of the formats involved. Explain. (b) Discuss in detail the advanced anti virus techniques?

[8+8]

7. (a) Explain the route table modification vulnerability?

nt

(b) Explain the security mechanisms?

[8+8]

8. (a) What are the two rules that a reference monitor enforces?

Aj

(b) Explain the techniques used by a firewall to control access?

?????

3

[8+8]

Code No: 07A60503

R07

Set No. 3

in

III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Explain the SNMP community facility?

[8+8]

ld .

(b) Explain the phases of a virus? 2. Discuss about the public key management in PGP?

[16]

3. (a) What are the limitations of a firewall? Explain.

or

(b) What are two default policies that can be taken in a packet filter if there is no match to any rule? Which is more conservative? Explain with example rule sets of both the policies? [8+8] 4. (a) What are the requirements for the use of a public key certificate scheme?

(b) Briefly explain the X.509 authentication service.

[8+8]

5. (a) Explain the buffer overflow attack with an example?

uW

(b) Explain the format string vulnerability?

[8+8]

6. (a) Explain about the authentication header?

(b) Explain the transport and tunnel modes of ESP?

[8+8]

7. (a) In SSL and TLS, why is there a separate Change Cipher Spec Protocol, rather than including a change cipher spec message in the Handshake Protocol?

nt

(b) Explain the significance of dual signature in SET?

[8+8]

8. (a) Discuss the factors on which the strength of DES depends? (b) Explain security over hash functions and MAC?

Aj

?????

4

[8+8]

R07 Set No. 2

Computer Science And Engineering · Time: 3 hours · Max Marks: 80 · Answer any FIVE Questions · All Questions carry equal marks · ***** · 1. (a) Distinguish between a packet-filtering router and a stateful inspection firewall? (b) ”One way to secure against Trojan horse attacks is the use of a secure, trusted · OS”. Explain?

44KB Sizes 2 Downloads 234 Views

Recommend Documents

R07 Set No. 2
(a) What is Radix-64 format? Explain how both PGP and S/MIME perform the · Radix-64 conversion is performed. (b) Describe the five principal services that ...

R07 Set No. 2
Farm in Maharashtra, supplied with water from a dug well pumping for 4 h a day, are given below. Determine the required discharge. [16]. 7. AjntuWorld.in ...

R07 Set No. 2
... carry equal marks · ***** · 1. List eight major functions of an exhaust nozzle. .... plane. Show the internal layout for swallowed air to reach the engine. Explain.

R07 Set No. 2
Describe the Kinetic aspects of methanol synthesis process. [16] · 7. Describe the procedure for the Acetylene manufacture from the hydrocarbons by.

R07 Set No. 2
Enumerate difference between growth and non-growth associated product kinetics. [16] · 7. Write a brief note on biosensors, and describe how they are used for ...

R07 Set No. 2
(b) A turbine is to operate under a head of 30 m at 300 r.p.m. The discharge is ... 2. (b) An inward flow reaction turbine has an external diameter of 1 m and its.

R07 Set No. 2
(a) Discuss the response of high pass RC circuit for square wave input. (b) A 10Hz square wave is fed to an amplifier. Calculate and sketch the output wave ...

R07 Set No. 2
[16] · 8. With a neat sketch discuss the working procedure of neutron radiography, and also · give applications, advantages and limitations of this method. [16] · *****. 1 ... 5. (a) Give the limitations of x-ray diffraction method and ultrasonic met

R07 Set No. 2
Code No: 07A4EC15. R07. Set No. 2. II B.Tech II Semester Regular Examinations,May 2010 · MECHANICS OF FLUIDS · Metallurgy And Material Technology.

R07 Set No. 2
tetrachloride during indirect chlorinate of TiO2 at 1020 0C · [16] · TiO2(g) + 2Cl2(g) = TiCl4(g) + O2. 8. (a) How do the interstitial elements affect mechanical properties of commercially · pure titanium? (b) Why is 0.2 % Pd added to titanium? What

R07 Set No. 2
register machine.(Hint: Use FNS). [8+8] · 5. (a) Explain the strassen's matrix multiplication · (b) Derive the time complexity for binary search. [8+8] · 6. (a) Find an ...

R07 Set No. 2
Variance · (b) The mean and variance of a binomial distribution are 2 and 8 / 5. Find ... marks were normally distributed with mean 70 and standard deviation 15.

R07 Set No. 2
1. With the help of a neat diagram indicating the various geometric elements of a · traffic rotary ... sight distance. What is the need to have SSD and factors.

R07 Set No. 2
2. Explain the alpha, delta, theta and beta waves emerging from the brain. [16] · 3. (a) Explain in detail on the isolation amplifiers used in medical field and its need ... Discuss the generation and propagation of action potential in a cell. [16] ·

R07 Set No. 2
(a) Steam pressure in a reactor heating coil. (b) Flow rate of reactants into a polymerization tank. (c) Flow of effluent from a waste water treatment holding tank into a river. (d) Flow of cooling water to a distillation condenser. [16] · 6. (a) Def

R07 Set No. 2
(a) State Newton's law of viscosity and give any four examples of its applications. (b) An oil of viscosity 8 poise is used for lubrication between a shaft and sleeve.

R07 Set No. 2
2. III B.Tech I Semester Examinations,May 2011 · MICROPROCESSORS AND INTERFACING · Common to Information Technology, Instrumentation And Control.

R07 Set No. 2
(a) Off - peak load is zero ... load current and p.f 0.1. capacitors are supplied to make the line power factor ... (b) The annual peak load of substation is 3500kW.

R07 Set No. 2
Set No. 2. (a) Construct a systematic (15,2) code using the generator polynomial .... taken. The bit rate is 'rb' and the channel noise has a PSD Gn(f) given by.

R07 Set No. 2
Discuss the principle of measuring the hardness of Heat Affected Zone using Jominey · hardenability test? .... (b) What is post weld heat treatment? Describe the ...

R07 Set No. 2
(a) State Darcy's law. Discuss the assumptions and limitations. .... 1. (a) State Stoke's law and explain its limitations as applicable to the sedimentation · analysis.

R07 Set No. 2
[4+4+4+4] · 4. Add a new method in the base class of Shapes.java that prints a message, but don't .... (d) Dynamic binding and message passing. [4+4+4+4].

R07 Set No. 2
Discuss clustering and solubility of liquid mixture. [16] · 3. Define: ... no adsorption at the pore wall and for the case with monolayer adsorption at the · pore wall.

R07 Set No. 2
Calculate the depth of indentation produced on a glass surface in ultrasonic ma- · chining by the throwing action of abrasive grain of 100 µm diameter.