0% found this document useful (0 votes)
35 views1 page

Internet Security April 2008

This document is an exam for a course on Internet Security from Mumbai University. The exam contains 7 questions testing knowledge of topics like packet spoofing, security policies, encryption, viruses, firewalls, social engineering, cryptography, authentication failures, and more. Students are asked to answer questions providing explanations, examples, and diagrams when necessary. The goal is to assess understanding of key concepts and technologies relating to internet and computer security.

Uploaded by

gk1290
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views1 page

Internet Security April 2008

This document is an exam for a course on Internet Security from Mumbai University. The exam contains 7 questions testing knowledge of topics like packet spoofing, security policies, encryption, viruses, firewalls, social engineering, cryptography, authentication failures, and more. Students are asked to answer questions providing explanations, examples, and diagrams when necessary. The goal is to assess understanding of key concepts and technologies relating to internet and computer security.

Uploaded by

gk1290
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Tech Solution Computer Institute...

Mumbai University
Bachelor of Information Technology (B.Sc. IT)
Third year Semester V
Internet Security
April 2008

CON.
(3 Hours) [Total Marks: 100

N.B. 1. Question No.1 is Compulsory.


2. From the remaining (Q Nos. 2 to 7) attempt any four.
3. Draw neat labeled diagram whenever necessary
Q1 a) What do you mean by packet spoofing and packet sniffing? 05
b) Write a note on Incident Handling. 05
c) What are the components of security policy? 05
d) Explain what you mean by Plain Text, Cipher Text, Encryption and Decryption. 05
Q2 a) Enumerate the characteristics and components of a good security policy. 08
b) What are the different types of Viruses? Explain the structure of viruses. 08
c) Discuss in detail the classification of attacks. 04
Q3 a) State And explain different security models. 08
b) What firewalls can do? What firewall cannot do? Where should we 08
implement the firewall?
c) Write a note on Digging of Worms. 04
Q4 a) Discuss in detail Substitution Cipher and Transposition Cipher. 08
b) Explain the concept of Social Engineering. What methods are used by the 08
hackers for this purpose? Also mention the countermeasures.
c) How to protect computer against viruses. 04
Q5 a) What are various assets that should be protected against security attacks? 08
What are the threats against computer security?
b) Explain the following terms in detail: 08
(i) Authentication Failures
(ii) Protocol Failures.
c) How Trojan horse works? Explain. 04
Q6 a) What is difference between symmetric and asymmetric key 08
cryptography? Explain the Diffie-Hellmen Key Exchange Algorithm
with an example.
b) What are application gateways? Why are they known as proxy servers? 08
Explain their working in detail. How are they different from circuit
gateways?
c) 04
Explain Bots and Botnets, their application and misapplication.
Q7 Write short notes on the following: 20
Bugs and Back doors.
a)
b) Digital Signatures.
c) History of Virus.
d) Key Wrapping.

You might also like