III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. Discuss about
(b) security services (c) security mechanisms.
[16]
2. (a) Explain the rule-based intrusion detection?
[8+8]
or
(b) Discuss about data access control. 3. Explain the AES algorithm?
ld .
(a) security attacks
[16]
4. (a) What is Radix-64 format? Explain how both PGP and S/MIME perform the Radix-64 conversion is performed.
uW
(b) Describe the five principal services that Pretty Good Privacy (PGP) provides. [8+8] 5. (a) What are the web security considerations (b) What are the key features of SET?
(c) What are the elements involved in SET? Explain?
4+4+8]
6. (a) Discuss the key elements included in the model of network management used for SNMP?
nt
(b) Explain the functional enhancements made in SNMPV2 over SNMPV1. [8+8]
7. (a) How does the encapsulating security payload work? (b) How are the secure keys distributed in IPSec?
[8+8]
Aj
8. (a) Explain the procedure involved in RSA public-key encryption algorithm? (b) Explain what Kerberos is and give its requirements. ?????
1
[8+8]
Code No: 07A60503
R07
Set No. 4
in
III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Distinguish between a packet-filtering router and a stateful inspection firewall?
2. Explain the working of SSL protocol?
ld .
(b) ”One way to secure against Trojan horse attacks is the use of a secure, trusted OS”. Explain? [8+8] [16]
3. (a) What is IPSec authentication header? Explain? (b) Discuss the purpose of SA selectors?
or
4. (a) How does PGP use the concept of trust?
(b) Discuss the functions provided by S/MIME?
[8+8]
[8+8]
5. (a) With a neat diagram explain SNMPV3 message format with USM?
uW
(b) Discuss about the four generations of the anti virus software?
[8+8]
6. (a) What are the criteria used while designing the DES algorithm? (b) In AES, how the encryption key is expanded to produce keys for the 10 rounds. [8+8] 7. (a) In the context of Kerberos, what is a realm? Explain? (b) What are the requirements of public key cryptography?
[8+8]
nt
8. (a) How IP spoofing and session hijacking work? (b) Discuss the various types of security attacks?
Aj
?????
2
[8+8]
Code No: 07A60503
R07
Set No. 1
in
III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????
2. (a) Explain the key features of SET?
ld .
1. Explain the key distribution techniques in public key cryptographic algorithms? [16]
(b) What is SSL? Explain the advantages and disadvantages of SSL? 3. (a) How is IP security achieved? Explain.
[8+8]
(b) What are various applications of IP Security?
or
(c) Explain the features of Oakley?
[8+4+4]
4. (a) Compare and contrast the key management in PGP and S/MIME. (b) Write about how PGP messages are created.
[8+8]
uW
5. (a) What is the difference between an unconditionally secure cipher and a computationally secure cipher? (b) Briefly describe about the Strength of DES?
[8+8]
6. (a) Draw the figure indicating the relationship among the different versions of SNMP by means of the formats involved. Explain. (b) Discuss in detail the advanced anti virus techniques?
[8+8]
7. (a) Explain the route table modification vulnerability?
nt
(b) Explain the security mechanisms?
[8+8]
8. (a) What are the two rules that a reference monitor enforces?
Aj
(b) Explain the techniques used by a firewall to control access?
?????
3
[8+8]
Code No: 07A60503
R07
Set No. 3
in
III B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) Explain the SNMP community facility?
[8+8]
ld .
(b) Explain the phases of a virus? 2. Discuss about the public key management in PGP?
[16]
3. (a) What are the limitations of a firewall? Explain.
or
(b) What are two default policies that can be taken in a packet filter if there is no match to any rule? Which is more conservative? Explain with example rule sets of both the policies? [8+8] 4. (a) What are the requirements for the use of a public key certificate scheme?
(b) Briefly explain the X.509 authentication service.
[8+8]
5. (a) Explain the buffer overflow attack with an example?
uW
(b) Explain the format string vulnerability?
[8+8]
6. (a) Explain about the authentication header?
(b) Explain the transport and tunnel modes of ESP?
[8+8]
7. (a) In SSL and TLS, why is there a separate Change Cipher Spec Protocol, rather than including a change cipher spec message in the Handshake Protocol?
nt
(b) Explain the significance of dual signature in SET?
[8+8]
8. (a) Discuss the factors on which the strength of DES depends? (b) Explain security over hash functions and MAC?
Computer Science And Engineering · Time: 3 hours · Max Marks: 80 · Answer any FIVE Questions · All Questions carry equal marks · ***** · 1. (a) Distinguish between a packet-filtering router and a stateful inspection firewall? (b) âOne way to secure against Trojan horse attacks is the use of a secure, trusted · OSâ. Explain?
(a) What is Radix-64 format? Explain how both PGP and S/MIME perform the · Radix-64 conversion is performed. (b) Describe the five principal services that ...
Farm in Maharashtra, supplied with water from a dug well pumping for 4 h a day, are given below. Determine the required discharge. [16]. 7. AjntuWorld.in ...
... carry equal marks · ***** · 1. List eight major functions of an exhaust nozzle. .... plane. Show the internal layout for swallowed air to reach the engine. Explain.
Enumerate difference between growth and non-growth associated product kinetics. [16] · 7. Write a brief note on biosensors, and describe how they are used for ...
(b) A turbine is to operate under a head of 30 m at 300 r.p.m. The discharge is ... 2. (b) An inward flow reaction turbine has an external diameter of 1 m and its.
(a) Discuss the response of high pass RC circuit for square wave input. (b) A 10Hz square wave is fed to an amplifier. Calculate and sketch the output wave ...
[16] · 8. With a neat sketch discuss the working procedure of neutron radiography, and also · give applications, advantages and limitations of this method. [16] · *****. 1 ... 5. (a) Give the limitations of x-ray diffraction method and ultrasonic met
tetrachloride during indirect chlorinate of TiO2 at 1020 0C · [16] · TiO2(g) + 2Cl2(g) = TiCl4(g) + O2. 8. (a) How do the interstitial elements affect mechanical properties of commercially · pure titanium? (b) Why is 0.2 % Pd added to titanium? What
register machine.(Hint: Use FNS). [8+8] · 5. (a) Explain the strassen's matrix multiplication · (b) Derive the time complexity for binary search. [8+8] · 6. (a) Find an ...
Variance · (b) The mean and variance of a binomial distribution are 2 and 8 / 5. Find ... marks were normally distributed with mean 70 and standard deviation 15.
1. With the help of a neat diagram indicating the various geometric elements of a · traffic rotary ... sight distance. What is the need to have SSD and factors.
2. Explain the alpha, delta, theta and beta waves emerging from the brain. [16] · 3. (a) Explain in detail on the isolation amplifiers used in medical field and its need ... Discuss the generation and propagation of action potential in a cell. [16] ·
(a) Steam pressure in a reactor heating coil. (b) Flow rate of reactants into a polymerization tank. (c) Flow of effluent from a waste water treatment holding tank into a river. (d) Flow of cooling water to a distillation condenser. [16] · 6. (a) Def
(a) State Newton's law of viscosity and give any four examples of its applications. (b) An oil of viscosity 8 poise is used for lubrication between a shaft and sleeve.
(a) Off - peak load is zero ... load current and p.f 0.1. capacitors are supplied to make the line power factor ... (b) The annual peak load of substation is 3500kW.
Set No. 2. (a) Construct a systematic (15,2) code using the generator polynomial .... taken. The bit rate is 'rb' and the channel noise has a PSD Gn(f) given by.
Discuss the principle of measuring the hardness of Heat Affected Zone using Jominey · hardenability test? .... (b) What is post weld heat treatment? Describe the ...
(a) State Darcy's law. Discuss the assumptions and limitations. .... 1. (a) State Stoke's law and explain its limitations as applicable to the sedimentation · analysis.
[4+4+4+4] · 4. Add a new method in the base class of Shapes.java that prints a message, but don't .... (d) Dynamic binding and message passing. [4+4+4+4].
Discuss clustering and solubility of liquid mixture. [16] · 3. Define: ... no adsorption at the pore wall and for the case with monolayer adsorption at the · pore wall.
Calculate the depth of indentation produced on a glass surface in ultrasonic ma- · chining by the throwing action of abrasive grain of 100 µm diameter.