0% found this document useful (0 votes)
46 views2 pages

QP17 Network Security

This document is an exam paper for an eighth semester electronic communication and engineering course on network security. It contains two parts - Part A consists of 10 short answer questions worth 2 marks each on topics related to network security concepts. Part B consists of 5 longer answer questions worth 16 marks each, providing choices between explaining algorithms, protocols, architectures and issues related to network and wireless security. Students must answer all questions in the paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views2 pages

QP17 Network Security

This document is an exam paper for an eighth semester electronic communication and engineering course on network security. It contains two parts - Part A consists of 10 short answer questions worth 2 marks each on topics related to network security concepts. Part B consists of 5 longer answer questions worth 16 marks each, providing choices between explaining algorithms, protocols, architectures and issues related to network and wireless security. Students must answer all questions in the paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

Question Paper Code : 21138

B.E./B.Tech. DEGREE EXAMINATION, APRIL 2014.

Eighth Semester
Electronic Communication and Engineering

CS 1028 A - NETWORK SECURITY

(Regulation 2008)
Time : Three hours Maximum : 100 marks

Answer ALL questions.

PART A - (10 x 2 = 20 marks)


1. Define cryptography.

2. What is digital Signatures?

3. What is Hash function? Give its characteristics.

4. Differentiate publicly and privately.

5. Give advantages of DES.

6. What is the need for Antharication?

7. What is SHA?

8. What is ECC?

9. What are the password management Strategies?

10. What is Trusted system? Give its models.

PART B - (5 x 16 = 80 marks)

11. (a) Explain about Hill Cipher Algorithm in detail. (16)

Or

(b) Explain about Contemporary Symmetric Ciphers in detail. (16)

PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor
12. (a) Explain RSA Algorithm with an example. (16)

Or
(b) Explain about Message Authentication and Hash Function in detail. (16)
13. (a) Discuss about Kerberos X.509 Architecture and Authentication services
in detail. (16)

Or
(b) (i) Describe IP Security Architecture in detail. (8)
(ii) Explain about E-Mail application and MIME. (8)

14. (a) What is Intrusion? And explain about Intrusion Detection techniques in
detail. (16)

Or
(b) Explain about Firewall design principles in detail. (16)

15. (a) Explain about WLAN security standards in detail. (16)

Or
(b) Discuss about WLAN security issues in detail. (16)

21138

PDF compression, OCR, web optimization using a watermarked evaluation copy of CVISION PDFCompressor

You might also like