Code No: 07A81903

R07

Set No. 2

in

IV B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Electronics And Computer Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) What can be the two main attacks on corporate networks? (b) Give a detailed description of the two approaches to intrusion detection?[4+12]

ld .

2. (a) Define a Security attack. Explain in detail about the various types of attacks an Internetwork is vulnerable to. (b) Write about Man-in-the-middle attacks. [10+6]

(a) (b) (c) (d) (e)

Radix-64 Session key Compression Encryption Decryption.

or

3. Write about the following terms related to PGP and S/MIME:

uW

4. (a) What action is taken by SSL when a fatal alert is received? (b) Discuss in detail the four phases of handshake protocol? 5. (a) Explain the use of S-Boxes in AES algorithm. (b) Differentiate between DES and AES algorithms. (c) Enumerate the various cipher block modes of operation.

[16] [4+12]

[5+5+6]

nt

6. (a) Explain in detail Anti-Replay mechanism in AH? (b) What is a cookie? How are they used in thwarting clogging attacks in Oakley algorithm? [8+8]

Aj

7. (a) What are the requirements for Public-key cryptography? Also enumerate some of the popular applications of Public-key cryptosystems. (b) Explain the motivation for Kerberos application, also listing the requirements for the same. [8+8] 8. It was stated that the inclusion of salt in the UNIX password scheme increases the difficulty of guessing by a factor of 4096. But the salt is stored in the plain text in the same entry as the corresponding cipher text password. Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security? Wouldnt it by possible to thwart Completely all password crackers by dramatically increasing the salt size to Say, 24 or 48 bits?[16] ????? 1

Code No: 07A81903

R07

Set No. 4

in

IV B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Electronics And Computer Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ????? 1. (a) With a suitable example show how the Digital Signature provides security. Also highlight the disadvantages of Digital signature. Version Serial number Signature algorithm identifier Issuer unique identifier Subject unique identifier Signature.

or

i. ii. iii. iv. v. vi.

ld .

(b) Explain the terms used in relation with X.509 certificate:

[8+8]

2. (a) What is the data base that defines the parameter associated with each SA? What are the parameters defined in the database?

uW

(b) Explain how encapsulating security payload provides confidentiality services? [8+8] 3. (a) What is a cipher block mode of operation? Explain the use of these modes of operation for the block ciphers for encipherment, (b) Describe the different methods of Message authentication.

[8+8]

4. (a) Show clearly how Confidentiality is ensured among users of PGP. [8+8]

nt

(b) Give an overview of MIME and its functionality.

5. (a) What is a Security attack? Give the classification of the Security attacks. Discuss the following terms in detail with relevant examples: Interruption Interception Modification Fabrication

Aj

i. ii. iii. iv.

(b) Explain UDP hijacking.

[10+6]

6. (a) List the design goals for a firewall? (b) What are false Positives and false Negatives? (c) What are the Properties that a Multilevel Secure System must enforce?[6+4+6] 7. Explain how the following threats to web security can be defended by SSL. 2

Code No: 07A81903

R07

Set No. 4

(a) Known plaintext dictionary attack (b) Replay attack (c) Password sniffing (d) SYN flooding.

[16]

in

8. (a) Draw the figure showing VACM logic and explain?

Aj

nt

uW

or

?????

ld .

(b) The encryption scheme used for UNIX passwords is one way; it is not possible to reverse it. Therefore, would it be accurate to say that this is, in fact, a hash code rather than an encryption of the password. [8+8]

3

Code No: 07A81903

R07

Set No. 1

1. (a) What are the business requirements for SET?

in

IV B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Electronics And Computer Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????

ld .

(b) Mention the types of threats on the web? Discuss their consequences and mention the countermeasures? [8+8] 2. (a) What is Radix-64 format? Explain how both PGP and S/MIME perform the Radix-64 conversion is performed.

(b) Describe the five principal services that Pretty Good Privacy (PGP) provides. [8+8]

or

3. (a) Make a comparison of transport and tunnel modes?

(b) Mention the encryption and authentication algorithms used in ESP service? Discuss the purpose of padding in ESP protocol? [8+8] 4. (a) Explain the conventional encryption principles with a neat illustration.

uW

(b) Differentiate between Message authentication and User authentication. [8+8] 5. (a) Discuss in detail about network management architecture? (b) What are the deficiencies of SNMPV1? (c) Give a brief note of distributed network management.

[8+4+4]

6. (a) Explain what each of the following means used in Kerberos: Authentication server Ticket Granting server Kerberos realm Kerberos principal.

nt

i. ii. iii. iv.

Aj

(b) Explain the three alternative authentication procedures that X.509 uses across various applications. [8+8]

7. (a) What are two default policies that can be taken in a packet filter if there is no match to any rule? Which is more conservative? Explain with example rule sets both the policies? (b) What are the advantages of decomposing a user operation into elementary actions? (c) What are false negatives and false positives?

[6+6+4]

8. (a) “Gaining control over the Routing tables at layer 3 is one of the attacks” explain how Route tables modification is crucial. 4

Code No: 07A81903

R07

Set No. 1

(b) Explain how Buffer overflow is created for any known platforms (eg., WINDOWS NT / LINUX). [8+8]

Aj

nt

uW

or

ld .

in

?????

5

Code No: 07A81903

R07

Set No. 3

1. (a) What are the advantages of screened-subnet firewall system?

2. (a) Describe the Internet standards and RFCs.

[6+10]

ld .

(b) Explain the concept of Trusted systems?

in

IV B.Tech II Semester Examinations,APRIL 2011 INFORMATION SECURITY Electronics And Computer Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All Questions carry equal marks ?????

(b) Explain how Address Resolution Protocol table becomes a victim for attacks. [8+8] 3. (a) Define Security Association? What parameters define SA?

or

(b) Give the formats of IPSec AH and IPSec ESP?

[8+8]

4. (a) What is an access policy? On what factors does access determination depends? (b) Discuss the two techniques for developing an effective an efficient proactive password checker? [8+8]

uW

5. (a) Explain clearly the reasons why RSA algorithm is the most resorted algorithm for various security applications. (b) Explain Key distribution techniques.

[8+8]

6. (a) Draw the diagrams showing the relative location of security facilities in TCP/IP protocol stack? Discuss the advantages of each?

nt

(b) What is SSL session? Can a session be shared among multiple connections? What are the parameters that define a session state? [8+8] 7. Discuss the following in relation with S/MIME: (a) RFC 822

(b) MIME Header fields

[5+5+6]

Aj

(c) MIME Content types.

8. (a) Compare AES cipher versus RC4 encryption algorithm. (b) Compare and contrast SHA-1 and HMAC functions. ?????

6

[8+8]

R07 Set No. 2

(a) What is Radix-64 format? Explain how both PGP and S/MIME perform the · Radix-64 conversion is performed. (b) Describe the five principal services that ...

45KB Sizes 1 Downloads 231 Views

Recommend Documents

R07 Set No. 2
Farm in Maharashtra, supplied with water from a dug well pumping for 4 h a day, are given below. Determine the required discharge. [16]. 7. AjntuWorld.in ...

R07 Set No. 2
... carry equal marks · ***** · 1. List eight major functions of an exhaust nozzle. .... plane. Show the internal layout for swallowed air to reach the engine. Explain.

R07 Set No. 2
Describe the Kinetic aspects of methanol synthesis process. [16] · 7. Describe the procedure for the Acetylene manufacture from the hydrocarbons by.

R07 Set No. 2
Enumerate difference between growth and non-growth associated product kinetics. [16] · 7. Write a brief note on biosensors, and describe how they are used for ...

R07 Set No. 2
(b) A turbine is to operate under a head of 30 m at 300 r.p.m. The discharge is ... 2. (b) An inward flow reaction turbine has an external diameter of 1 m and its.

R07 Set No. 2
(a) Discuss the response of high pass RC circuit for square wave input. (b) A 10Hz square wave is fed to an amplifier. Calculate and sketch the output wave ...

R07 Set No. 2
[16] · 8. With a neat sketch discuss the working procedure of neutron radiography, and also · give applications, advantages and limitations of this method. [16] · *****. 1 ... 5. (a) Give the limitations of x-ray diffraction method and ultrasonic met

R07 Set No. 2
Code No: 07A4EC15. R07. Set No. 2. II B.Tech II Semester Regular Examinations,May 2010 · MECHANICS OF FLUIDS · Metallurgy And Material Technology.

R07 Set No. 2
tetrachloride during indirect chlorinate of TiO2 at 1020 0C · [16] · TiO2(g) + 2Cl2(g) = TiCl4(g) + O2. 8. (a) How do the interstitial elements affect mechanical properties of commercially · pure titanium? (b) Why is 0.2 % Pd added to titanium? What

R07 Set No. 2
register machine.(Hint: Use FNS). [8+8] · 5. (a) Explain the strassen's matrix multiplication · (b) Derive the time complexity for binary search. [8+8] · 6. (a) Find an ...

R07 Set No. 2
Variance · (b) The mean and variance of a binomial distribution are 2 and 8 / 5. Find ... marks were normally distributed with mean 70 and standard deviation 15.

R07 Set No. 2
Computer Science And Engineering · Time: 3 hours · Max Marks: 80 · Answer any FIVE Questions · All Questions carry equal marks · ***** · 1. (a) Distinguish between a packet-filtering router and a stateful inspection firewall? (b) ”One way to secure

R07 Set No. 2
1. With the help of a neat diagram indicating the various geometric elements of a · traffic rotary ... sight distance. What is the need to have SSD and factors.

R07 Set No. 2
2. Explain the alpha, delta, theta and beta waves emerging from the brain. [16] · 3. (a) Explain in detail on the isolation amplifiers used in medical field and its need ... Discuss the generation and propagation of action potential in a cell. [16] ·

R07 Set No. 2
(a) Steam pressure in a reactor heating coil. (b) Flow rate of reactants into a polymerization tank. (c) Flow of effluent from a waste water treatment holding tank into a river. (d) Flow of cooling water to a distillation condenser. [16] · 6. (a) Def

R07 Set No. 2
(a) State Newton's law of viscosity and give any four examples of its applications. (b) An oil of viscosity 8 poise is used for lubrication between a shaft and sleeve.

R07 Set No. 2
2. III B.Tech I Semester Examinations,May 2011 · MICROPROCESSORS AND INTERFACING · Common to Information Technology, Instrumentation And Control.

R07 Set No. 2
(a) Off - peak load is zero ... load current and p.f 0.1. capacitors are supplied to make the line power factor ... (b) The annual peak load of substation is 3500kW.

R07 Set No. 2
Set No. 2. (a) Construct a systematic (15,2) code using the generator polynomial .... taken. The bit rate is 'rb' and the channel noise has a PSD Gn(f) given by.

R07 Set No. 2
Discuss the principle of measuring the hardness of Heat Affected Zone using Jominey · hardenability test? .... (b) What is post weld heat treatment? Describe the ...

R07 Set No. 2
(a) State Darcy's law. Discuss the assumptions and limitations. .... 1. (a) State Stoke's law and explain its limitations as applicable to the sedimentation · analysis.

R07 Set No. 2
[4+4+4+4] · 4. Add a new method in the base class of Shapes.java that prints a message, but don't .... (d) Dynamic binding and message passing. [4+4+4+4].

R07 Set No. 2
Discuss clustering and solubility of liquid mixture. [16] · 3. Define: ... no adsorption at the pore wall and for the case with monolayer adsorption at the · pore wall.

R07 Set No. 2
Calculate the depth of indentation produced on a glass surface in ultrasonic ma- · chining by the throwing action of abrasive grain of 100 µm diameter.