0% found this document useful (0 votes)
53 views2 pages

Paper Id (Css03) : .' /T. ' ('1. /) Q M. Tech. (Sed1

This document is a study guide for an exam on Network Security. It contains 8 questions covering various topics: 1. Application layer security and TCP/IP protocol 2. MAC addressing and subnet masking 3. Limitations of IPv4 and IPv6 address space 4. Security issues in mobile networks 5. IP multicasting components and advantages over unicasting 6. Address Resolution Protocol and purpose of authentication headers 7. Port types, attachment methods for FDDI networks 8. Handling unknown addresses in MAC and short notes on session hijacking and digital signatures

Uploaded by

sandeepapr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

Paper Id (Css03) : .' /T. ' ('1. /) Q M. Tech. (Sed1

This document is a study guide for an exam on Network Security. It contains 8 questions covering various topics: 1. Application layer security and TCP/IP protocol 2. MAC addressing and subnet masking 3. Limitations of IPv4 and IPv6 address space 4. Security issues in mobile networks 5. IP multicasting components and advantages over unicasting 6. Address Resolution Protocol and purpose of authentication headers 7. Port types, attachment methods for FDDI networks 8. Handling unknown addresses in MAC and short notes on session hijacking and digital signatures

Uploaded by

sandeepapr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

~

Roll No. ...............................


~
Total No. of Questions: 08] [Total No. of Pages: 02

Paper ID [CSS03]
(('lease fill this l'aper ID ill Oi\IR Sheet)
.' \t.~'{'1.~\)Q
M. Tech. (SeD1. - 1st) "

NETWORK SECURITY (CS - 503)


Time: 03 Hours Maximum Marks: 100
Instruction to Candidates:
1) Attempt any Five questions.
2) All questions carry equal marks.

Ql) (a) What are responsibilities of application layer? How is security handled
at this level?
(b) Discuss TCP/IP protocol in brief.

Q2) (a) Discuss MAC addressing for layer 2 devices.


(b) How is masking related to subnetting?

Q3) (a) What arethe limitations of IPv4? How does IPv6 provide large address
space?
(b) Discuss the compatibility of IPv6 with other technologies.

Q4) Discuss various security related issues related to mobile networks.

Q5) What is IP multicasting'? What are its uses? Discuss about its components.
What are its advantages over unicasting?
~ ~

(6) (a) What is address resolution protucol'? .

(b) What is the purpose of authentication header?

R-J021f2058] I~J:o.
Q7) (a)
"
(b)
What are
FDDI different port types and attachment methods for buHdin1't
networks? )
1
How are unknown addresses handled in MAC?
\
Q8) Write sh~~t notes on:

(a) Session Hijacking.


(b) ,Digital signatures.

~~I~~

You might also like