0% found this document useful (0 votes)
51 views2 pages

CN University Question Paper

This document contains a 5 question exam on computer networks. The exam covers topics like primary servers, user agent services, jitter and translation, sampling, cryptanalysis, DES encryption steps, IPSec, IKE protocols, firewall types (proxy and packet filter), streaming audio/video, iterative resolution, anonymous FTP, digital signatures, security services for messages, media servers, IMAP4 features/advantages/disadvantages, asymmetric cryptography, columnar transposition cipher, and Real-Time Transport Protocol. The exam tests the students knowledge of key computer networking concepts and protocols through short answer and longer explanation questions.

Uploaded by

sanika Gandhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views2 pages

CN University Question Paper

This document contains a 5 question exam on computer networks. The exam covers topics like primary servers, user agent services, jitter and translation, sampling, cryptanalysis, DES encryption steps, IPSec, IKE protocols, firewall types (proxy and packet filter), streaming audio/video, iterative resolution, anonymous FTP, digital signatures, security services for messages, media servers, IMAP4 features/advantages/disadvantages, asymmetric cryptography, columnar transposition cipher, and Real-Time Transport Protocol. The exam tests the students knowledge of key computer networking concepts and protocols through short answer and longer explanation questions.

Uploaded by

sanika Gandhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 5] SEAT No.

PA-1024 [Total No. of Pages : 2

[5902]-52
T.Y. B.Sc (Computer Science)
COMPUTER NETWORKS - II
(2019 Pattern) (Semester - V) (CS-352)
Time : 2 Hours] [Max. Marks : 35
Instructions to the candidates:
1) Attempt all questions.
2) Neat diagrams must be drawn wherever necessary.
3) Figurers to the right indicate full marks.
4) Assume suitable data if necessary.

Q1) Attempt any EIGHT of the following (out of TEN) [8 × 1 = 8]

a) What is PrimaryServer?

b) Write services provide by user agents, and explain composing message?

c) Define Jitter and Translation.

d) What is sampling?

e) Define cryptanalysis.

f) What is S-box component of a modern block cipher?

g) Write name of steps perform in each round of DES (Data Encryption


Standard) Cipher.

h) What is the purpose of IPSec?

i) Write name of protocols on which IKE (Internet Key Exchange) is based.

j) A proxy firewall is also called application gateway. Write true or false


and also justify.

P.T.O.
Q2) Attempt any FOUR of the following (out of FIVE) [4 × 2 = 8]
a) What is firewall? Explain with diagram.
b) What is streaming audio/video? Also write examples.
c) Write information about iterative resolution, with diagram.
d) What is anonymous FTP?
e) What is Digital Signature?

Q3) Attempt any TWO of the following (out of THREE) [2 × 4 = 8]


a) Explain security services for message.
b) Explain streaming stored audio/video Third Approach: Using a media
server.
c) Explain any four user agent services.

Q4) Attempt any TWO of the following (out of THREE) [2 × 4 = 8]


a) What is IMAP4? Write it’s features, advantages and disadvantages.
b) Explain asymmetric key cryptography with the help of diagram.
c) Explain in detail packet filter firewall, also write it’s advantages and
disadvantages.

Q5) Attempt any ONE of the following (out of TWO) [1 × 3 = 3]


a) Using columnar transposition cipher, convert following plaintextto
ciphertext. ‘allthepacketsfromporttenareallowed”, key=”COMPUTER”
b) Write note on Real-Time Transport protocol (RTP).



[5902]-52 2

You might also like