0% found this document useful (0 votes)
88 views

Internet Security October 2008

This document appears to be an exam for a third year Internet Security course at Mumbai University. The exam contains 7 questions testing students' knowledge of various topics related to internet security including: incident handling, risk assessment, botnets, social engineering, cryptography, firewalls, viruses, worms, trojans, packet filtering, symmetric/asymmetric cryptography, digital signatures, and distinguishing between traditional/distributed firewalls, active/passive attacks, symmetric/asymmetric cryptography, and sniffing/spoofing. The exam is out of a total of 100 marks and contains short answer and longer explanation questions.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views

Internet Security October 2008

This document appears to be an exam for a third year Internet Security course at Mumbai University. The exam contains 7 questions testing students' knowledge of various topics related to internet security including: incident handling, risk assessment, botnets, social engineering, cryptography, firewalls, viruses, worms, trojans, packet filtering, symmetric/asymmetric cryptography, digital signatures, and distinguishing between traditional/distributed firewalls, active/passive attacks, symmetric/asymmetric cryptography, and sniffing/spoofing. The exam is out of a total of 100 marks and contains short answer and longer explanation questions.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Visit hiddencomputertricks.blogspot.com for more...

Mumbai University
Bachelor of Information Technology (B.Sc. IT)
Third year Semester V
Internet Security
October 2008

CON. 4836-08 GL-5477


(3 Hours) [Total Marks: 100

N.B. 1. Question No.1 is Compulsory.


2. From the remaining (Q Nos. 2 to 7) attempt any four.
3. Draw neat labeled diagram whenever necessary
Q1 Explain the Following un detail:- 20
a) Incident Handling
b) Digging for worms
c) Risk Assessment
d) Digital Envelop
e) Botnets.
Q2 a) Explain the term security policy. Also enumerate its characteristics and 08
components.
b) Explain the concept of „social engineering‟. What methods do the hackers use 06
for this purpose? Also mention the countermeasures.
c) Write about the concept of filtering by service? 06
Q3 a) Explain the term Cryptography. Show the different techniques of cryptography. 08
What is firewall? Explain the concept of “Distributed Firewall”.
b) Explain the concept of “Protocol Failure”. Illustrate your points with three-way- 05
c) handshake of TCP. 06
Q4 a) What are the different types of viruses? Give the structure of virus. How will 08
you secure your system from virus attack?
b) Explain the strategies for secure network in detail. 06
c) What is malicious software? Compare Virus, Worms and Trojan horse. 06
Q5 a) Explain the term “Packet Filter” and explain the circuit level filter with SOCKS 08
implementation.
b) Explain any of the symmetric cryptography algorithms in detail. 06
c) Explain the filtering services for Telnet. 06
Q6 a) What is Message Digest? Explain any message digest algorithm in detail. 08
b) “In order to understand how secure any corporate network is, both inside and 06
outside attacks are required to be purposefully performed on it”. Comment and
explain your views on this statement with logical reasoning.
c) What is a digital signature? Show its implementation. 06
Q7 Distinguish between the following:- 20
Traditional Firewall and Distributed Firewall
a)
b) Active and Passive attack
c) Symmetric and Asymmetric cryptography
d) Sniffing and Spoofing.

Visit http://www.bscitmumbai.blogspot.com for more...

You might also like