06 IoT D2023
06 IoT D2023
2
3B
7E
50
69
45
Paper / Subject Code: 37481 / Cryptography and Network Security
23
2D
D1
06
38
3B
7E
50
69
45
D9
23
2D
D1
06
38
35
B
E
45
D9
3B
35
7
3
D1
38
35
8C
B2
0
7E
50
9
3B
6E
63
D
23
D1
35
C
0
C4
Duration: 3 Hours Maximum Marks: 80
B
E
8
50
9
B
6E
3
69
D
3
23
D1
06
35
8C
C4
2D
N.B.: -
3B
E
9
B
E
17
9
D
45
C3
06
6
6
D
4
2D
38
7E
C
8
1. Question No 1 is Compulsory
D9
B
E
50
69
45
D1
6
2. Solve any three questions out of remaining questions
5
8C
C4
23
D
8
7E
03
D9
2
B
E
3B
9
3. Assume suitable data if required and mention it clearly
C3
1
46
35
D6
4
35
9D
06
38
4. Figures to right indicate full marks
9C
8
2
52
3B
E
B
7E
D
6
5
D6
3
84
5
8C
4
23
D1
B3
9C
0
Q1 Solve any four of following: -
52
6E
B
E
50
D9
C3
D6
7
4
[A] What are the three security objectives for information and information system? 5
4
23
D1
38
35
9C
8
E0
B
[B] How C-Ciphertext and P-Plaintext expressed in Caesar Cipher? Explain with example. 5
E
3B
5
9
3B
C3
46
35
D6
17
84
D
06
35
8C
9C
E8
B2
D
03
52
E
[D] What are Elements of Network Access Control (NAC)? 5
D9
B
6E
46
35
D6
7
63
84
3
9C
B2
0
C4
03
52
7E
9
B
D6
3
9
84
D
C3
23
1
06
D6
35
D
C4
03
52
B
E
8
9
52
B
E
35
17
63
9
Q2 [A] What are traditional ciphers? Discuss Hill Cipher substitution method with example.
84
10
D
3
6
D6
84
35
8C
B2
9D
E0
4
03
[B] Explain various transformations of AES encryption in detail. 10
C
03
52
B
E
35
17
63
9
5D
C3
6
35
6
84
B2
9D
E0
4
D
B3
C
8
B2
Q3 [A] Elaborate the steps of key generation using RSA algorithm. In RSA system, what is the
03
52
17
63
9
5D
C3
6
35
D6
63
public key (E, n) and private key (D, n) and Ø (n) of this user if n=187. is defined. If
84
E0
C4
3
E8
B2
E0
03
D9
52
3B
the Ciphertext C =11, What is plaintext? Explain various kind of attacks on RSA
17
9
46
35
D6
17
63
35
8C
algorithm. 10
9D
38
C
B2
9D
E0
52
3B
6E
[B] How security is achieved in the transport and tunnel modes of IPsec? What are security
50
5D
D6
17
63
84
5D
8C
4
23
associations? 10
B3
9C
9D
E0
52
B3
E
3B
C3
46
35
6
17
4
5D
C3
D
06
38
9C
E8
B2
9D
Q4 [A] Explain steps involved for message digest generation using SHA 512. 10
52
B3
7E
E8
46
35
D6
3
84
5D
06
46
9C
B2
9D
52
B3
E
9C
0
6E
35
D6
17
63
84
5D
C3
Q5 [A] What are various types of Malicious software? Explain phishing attack. 10
B2
9D
0
4
03
52
B3
E
9C
E8
84
5D
C3
06
46
6
10
B2
9D
2D
03
B3
E
9C
E8
35
17
63
5D
5
C3
46
6
84
B2
9D
0
2D
E
9C
E8
03
17
63
5D
10
C3
46
6
84
9D
E0
2D
3
9C
E8
3
3B
17
50
5D
5
46
6
84
8C
9D
3
2D
3
9C
B2
3B
E
50
5D
5
46
6
63
**************
84
8C
23
2D
B3
C
E0
6E
3B
50
9
5
C3
6
84
4
23
2D
06
9C
E8
3
3B
7E
50
46
D6
84
23
1
06
9C
9D
2
3B
7E
50
45
D6
D
23
1
06
8
35
9D
52
3B
7E
50
84
D
23
1
06
35
9D
03
3B
7E
3B
35
D
06
35
8C
B2
9D
7E
3B
6E
63
D
41855
35
8C
9D
E0
C4
B
6E
17
5D
C3
9D
C4
B3
C46E8C3B35D9D17E063B235038452D69
E8
A3
4A
5F
17
B
Paper / Subject Code: 37487 / Ethical Hacking and Digital Forensic
C0
03
88
02
39
A3
4A
5F
B6
17
B
C0
03
88
02
39
AF
A3
4A
5F
B6
17
71
88
2
39
F
A7
0
0
A
A3
A
6
7
71
76
FB
31
4
Duration: 3hrs [Max Marks:80]
9
7
7B
30
60
3
A
A
17
1
A
76
B9
4
7
3
2
39
AF
N.B. : (1) Question No 1 is Compulsory.
A7
B
0
0
C0
A3
97
B6
17
71
76
(2) Attempt any three questions out of the remaining five.
5F
3
02
F
7
B
30
C0
A
88
(3) All questions carry equal marks.
A
7
B6
1
A
76
B9
4A
5F
2
AF
A7
7B
0
0
88
39
B6
C
2Q1 1 Attempt any FOUR. [20]
71
A
76
9
A
F
17
02
F
5
7
4
B
0
3
1A
88
6A
9
a Explain the following terms: (any five)s
97
B6
FC
30
A
7
7
7
B
2A
AF
1
7
4
a. Bit-stream image b. Chain of custody c. Evidence custody form d. Evidence bags e.
B
0
3
A
39
7
FC
0
A8
60
71
76
9
A3
Repeatable findings f. forensic workstations
17
0B
FB
7
4
B
3
8
2
6A
9
7
C
30
8
b Give classification of hackers.
60
3
1A
9
A
F
7
77
7
B
A
FB
85
4
B
77
0
03
2
6A
9
c Briefly explain what an expert witness and scientific witness is?
97
FC
A8
0
73
1A
6A
3
B6
B7
0B
A
85
94
77
B7
3
02
F
97
FC
0
8
3
A
6A
A
97
B6
17
0B
1
85
94
7
B7
03
2
AF
7
FC
A8
0
3
6A
3
97
6
FC
7
1
A
B
31
85
94
7
B7
0B
2
AF
85
30
A8
60
73
A
97
FC
A8
2 a Define digital forensics. Explain the need of digital forensics along with the lifecycle of [10]
2A
6
FB
31
94
77
7
0B
85
94
30
60
73
1A
6A
7
FC
digital forensics.
A8
73
2A
9
FB
31
7
7
0B
31
85
7
94
7B
30
0
1A
6A
b Explain the goal of incident response. Mention incidence response methodology with [10]
B6
FC
0
A8
73
2A
9
A3
7
B7
B
AF
31
85
A7
94
suitable diagram.
60
0
02
7
FC
0
A8
73
71
6
B9
FB
A3
6
7
FB
31
85
A7
94
B
C0
1A
02
97
0
8
73
1A
76
A3
F
B6
77
3 a Explain the importance of evidence handling in digital forensics. [10]
B
31
85
4
7B
77
0
02
6A
39
AF
FC
0
A8
6A
B9
A3
b Explain forensics analysis of the data acquired from any one of the operating system. [10]
B6
17
B7
71
85
94
B7
C0
03
02
AF
A7
97
8
73
A3
4A
7
5F
B6
0B
71
76
B9
31
88
02
39
AF
A7
FC
30
A
97
B6
7
71
A
76
31
85
94
0B
b Define data carving. List and discuss differ tools for forensic analysis. [10]
02
AF
A7
B
30
A8
73
97
B6
FC
71
2A
76
31
94
0B
AF
85
A7
B
0
60
73
A3
97
FC
A8
71
76
5 a Explain the goal of forensic report writing. Give the outline of the report. [10]
B
31
0B
02
AF
85
A7
B
30
97
B6
FC
A8
b Point out the features of Forensic Duplication and Investigation & also outline the [10]
71
2A
76
0B
AF
85
A7
4
problems and challenges forensic examiners face when preparing and processing
60
39
97
FC
A8
71
76
FB
7
85
A7
4
1A
39
97
FC
30
A8
76
17
77
0B
85
4
7B
03
6A
39
9
3
17
B7
0B
2A
85
4
39
97
FC
A8
60
17
i) Footprinting
0B
2A
FB
85
4
03
39
FC
8
4A
17
2A
FB
85
************************
03
39
8
60
A
4A
17
71
2A
FB
03
39
7
60
A
6A
17
42782 Page 1 of 1
71
2A
FB
7
03
7
7B
60
A
6A
A3
71
FB
B7
02
7
A
6A
97B76A771AFB602A30317394A885FC0B
97
B6
71
30
2B
0
A
9
EB
Paper / Subject Code: 37484 / Web X.0
52
20
9F
9C
09
A7
30
2B
24
EB
52
20
9F
9C
FF
09
A7
30
2B
D7
24
EB
0
9F
9C
FF
AF
2
A7
30
2B
Time :(3 hrs.) Maximum Marks = 80
4
1F
F2
0
9F
9C
AF
72
0F
F
NB:
2B
7
03
95
1F
9F
9C
FF
F
72
52
F
1. Question No. 1 is compulsory and solve any THREE questions from remaining
FA
2B
50
D7
24
FA
09
9
questions
C
FF
F
EB
B9
F
9
A
5
4
2. Assume suitable data if necessary
1F
30
2
FD
2
0
9C
F
B
52
20
3. Draw clean and neat diagrams
0F
F
A
E
24
9
A7
95
F
30
C2
FD
0
F
EB
52
0
F
9F
7F
49
FA
72
50
09
0
Q1 2B Marks
FD
F2
A
9
3
F1
B
2
0
F
7F
9C
.
FA
5
2
50
9
09
7
0
2B
FD
24
9
3
1
EB
52
20
F
9F
9C
FF
FA
50
09
A7
30
B
D
D7
24
29
F1
b. Explain Multilevel inheritance in TypeScript with example 5
2
AF
B
0
9F
9C
F
AF
95
72
0E
50
F
1F
2B
D7
B0
FA
c. Explain Asynchronous programming 5
29
3
1F
0F
9C
FF
F
95
72
0E
B9
0F
95
d. What is expressions in AngularJS 5
7
24
B0
FA
3
95
1F
C2
D
52
20
F
F
0E
52
B9
F
09
7
A
FA
09
03
5
1F
C2
FD
EB
29
.
FF
EB
72
B9
F
49
A
95
30
0
A
5
F
30
2
FD
F2
0
20
9F
9
C
EB
2
20
7F
49
A7
FA
5
B
10
0
09
A7
5
0
C2
FD
F2
9F
9
3
F1
.
EB
2
0
9F
7F
49
A
5
2
2B
50
F
0
2B
F2
9
03
F1
9C
AF
B
52
9F
7F
9C
72
24
09
1F
0
2B
D
24
29
3
FF
AF
0F
9F
9C
FF
95
2
D7
A7
1F
0
2B
D7
B0
29
3
2
AF
0F
9F
C
F
AF
95
2
0E
7F
95
1F
2B
4
B0
FA
3
1F
Q5 a.
D
10
52
20
0F
9C
F
AF
0E
B9
0F
09
7
95
D7
24
FA
03
95
C2
EB
FF
F
72
B9
0F
09
A
24
03
5
2
FD
EB
9F
9
Q6 a.
1
72
2
0F
49
FA
5
30
B
7
A
09
95
C2
FD
F2
20
9F
1
52
7F
49
A7
FA
2B
50
09
30
F2
9F
9
F1
9C
F
EB
7F
FA
5
2B
50
4
9
30
2
0
29
F1
________________
9C
FF
AF
EB
0
95
2
50
D7
24
7
1F
30
B0
FA
29
FF
AF
20
0F
95
0E
B9
D7
7
95
1F
B0
A
AF
2
0
0F
9F
95
2
0E
7
95
1F
2B
B0
FA
03
52
0F
9C
72
0E
B9
09
95
24
FA
03
C2
EB
52
F
72
B9
7F
09
30
4
A
C2
F2
EB
0
9F
72
7F
49
30
2B
A
FD
F2
20
9F
C
7F
49
A7
FA
2B
41847 Page 1 of 1
FD
F2
9F
1
9C
0F
7F
FA
2B
24
FD
F1
9C
FF
FA
50
50F1FAFD7FF249C2B9FA72030EB09529
D7
24
8
70
F7
EF
22
Paper / Subject Code: 37483 / Blockchain Technology
49
39
D2
85
01
79
F8
EF
97
22
9F
51
2
94
85
01
83
2D
CF
F7
EF
7
1F
52
39
6E
01
F5
F8
8
7
75
7
C
49
E
Duration: 3hrs [Max Marks:80]
9
EC
1
5
9
6
0
F
F8
F
5
7
39
EC
9F
7
1E
51
EC
94
D2
83
6
70
CF
F7
75
N.B. : (1) Question No 1 is Compulsory.
9
22
1F
49
3
39
EC
E
D2
85
(2) Attempt any three questions out of the remaining five.
79
6
8
5
EF
39
2
1F
F
C7
(3) All questions carry equal marks.
9
6E
D2
5
01
3
9E
F8
(4) Assume suitable data, if required and state it clearly.
8
5
97
22
9F
C7
3
1E
51
6E
D2
94
85
3
9E
70
CF
8
5
F7
22
1F
7
3
49
E
1 Attempt any FOUR [20]
EC
6E
39
2
85
01
F5
2D
79
F8
5
EF
39
7
EC
C7
F
a Explain structure of block in blockchain
52
51
2
4
01
3
56
D
E
79
F8
CF
9
97
2
b What are different types of blockchain?
EC
F
C7
F
3
E
52
1
9
6E
D2
94
01
5
56
9E
F8
F
c Explain the concept of block headers and how they are used to link blocks in a
8
F7
75
97
22
C
1F
C7
23
1E
9
EC
6E
blockchain.
94
85
F5
83
9E
70
F7
F
75
22
d Explain architecture of ethereum.
39
23
49
E
1
39
EC
5
D2
1
F5
2D
79
8
6
0
e Describe the role of Metamask in the Ethereum ecosystem. F8
F
5
7
9
22
EC
F
7
49
52
3
51
39
EC
D2
01
85
79
F8
56
F8
97
2 a Discuss the concept of a Bitcoin wallet. What are the different types of wallets, [10]
EF
9
2
F
7
1E
3
2
51
9
EC
6E
94
2
5
01
3
D
70
8
CF
F7
5
F
39
97
22
1F
b Describe the role and responsibilities of peer nodes in the Hyperledger Fabric [10]
C7
49
E
39
6E
D2
94
85
1
79
architecture. Also discuss the concept of channels in Hyperledger Fabric.
9E
0
8
5
F7
EF
7
22
EC
1F
9F
C7
3
49
39
D2
85
1
F5
83
56
9E
79
70
3 a Describe the step-by-step process of a typical Bitcoin transaction. Include the [10]
F8
22
EC
1F
C7
9F
3
49
D2
85
1
F5
3
56
9E
79
0
CF
b What are the essential tools and frameworks for setting up a development [10]
EF
97
EC
1F
C7
F
23
52
9
6E
94
environment for Solidity programming? Discuss the role of tools like Remix and
01
F5
56
2D
9E
F8
8
7
75
97
1F
C7
F
23
E
52
9
EC
94
01
F5
83
2D
9E
F8
6
F7
5
97
39
EC
1F
7
Discuss the purpose and significance of Bitcoin relay networks. How do they
23
4 a [10]
E
52
39
EC
94
D2
01
F5
2D
F8
56
F7
7
9
C
7
49
1E
52
3
b Define ERC721 tokens and explain their primary purpose. How do ERC721 [10]
51
39
EC
E
D2
79
F8
6
70
F
F8
F
7
49
1E
3
51
39
EC
E
2
85
79
56
D
70
F
F8
F
39
5 a Provide an overview of the Truffle framework. What is its primary purpose in [10]
2
EC
F
7
49
1E
51
39
C
D2
85
CF
8
75
F
39
22
1F
9F
development process?
E
EC
6E
D2
85
01
F5
83
b Contrast the security aspects of ICOs and STOs. How does the classification of [10]
5
EF
39
97
22
EC
1F
C7
tokens (security vs. utility) influence the security of the fundraising process?
D2
94
85
01
F5
56
9E
F7
EF
97
EC
C7
23
2
6 a Describe the roles played by different entities in the RAFT consensus algorithm. [10]
39
5
01
56
2D
9E
79
8
EF
C7
F
23
52
9
94
01
b Discuss the key security challenges in traditional IoT architectures. How can [10]
3
2D
9E
F8
F8
97
blockchain address these challenges and provide a more secure foundation for
F
23
E
52
51
39
94
01
IoT deployments?
2D
F8
CF
F8
F7
9 7
1E
52
1
39
6E
4
F5
F8
70
F8
F7
C
***********
49
1E
51
39
6E
79
70
F
F8
75
9F
49
51
EC
6E
83
79
CF
75
39
42065
1F
9F
EC
6E
F5
83
75
39
EC
1F
EC
39EC756ECF51F839F7949701EF8522D2
F5
56
8B
A4
01
B8
9E
Paper / Subject Code: 37482 / IoT Architecture and Protocols
87
69
57
69
CF
8B
A4
B8
9E
EA
0
87
69
57
69
CF
FA
8B
A4
B8
9E
EA
7F
69
57
9
F
A
6
C
BD
[TIME:3 hrs] [Marks:80]
A4
B8
9E
F
A
7F
E
96
57
9
CF
FA
E6
D
Note: 1. Question 1 is compulsory
F6
B8
A
9A
B
79
7F
2. Answer any three out of remaining questions
AE
01
F
9
6
AC
D
87
F6
B8
3. Assume suitable data where required
9E
FF
6B
8B
AE
1
57
F
D7
0
69
AC
7
69
B8
FF
8
B
F
8B
A4
AE
01
CF
7
Q1 Solve any 4
69
D
87
69
69
EA
B
1F
B
a) Illustrate IoT Application Transport Methods 5
F
B
A4
9E
F
7
0
8
69
AC
b) Discuss how low power consumption is essential for prolonging the life of 5
BD
7
69
57
FF
B8
1F
6
battery-operated devices in IoT.
A4
AE
B8
96
7
70
98
9
BD
F6
c) Short note on Communication models & API. 5
57
69
CF
FF
8
46
1
8
9E
96
d) Explain Data Versus Network Analytics 5
EA
D7
A
0
FB
98
F6
57
FF
e) Briefly elaborate the DICE. 5
6B
46
FA
6
C
01
B8
E
A
D7
9A
98
69
9
7F
87
E
57
CF
6B
46
1F
A
E6
Q2
BD
8B
B8
F
9A
69
79
a) Explain Mesh-Under Versus Mesh-Over Routing in 6LoWPAN 10
7F
87
AE
69
96
1F
85
6
AC
BD
b) Explore the Purdue Model for Control Hierarchy and its implications for 10
8B
A4
F6
E
FF
70
B
79
E
01
69
security practices in OT.
96
9
F
D7
B8
A
85
6
C
87
A4
6
E
FF
A
6B
1F
98
79
8B
AE
69
CF
7
Q3
70
46
9
85
D
69
9E
F
EA
8
9A
a) Explain working of AMQP with an example 10
B
1F
B
F
B
A4
96
57
CF
7
0
8
FA
E6
BD
87
69
B8
69
EA
1F
79
F
8B
A4
9E
96
CF
7
70
FA
85
D
Q4
9
F6
57
A
B8
B
46
FB
6
96
D7
A
0
FB
98
79
AC
7
F6
9
IoT applications.
F
8
6B
46
85
6
AC
F
8B
AE
1
E
b) Explain the importance of the physical layer and MAC (Medium Access 10
D7
A
0
B
9
9
87
AE
F6
57
69
CF
FF
Control) layer in IoT access technologies.
6B
46
8B
01
B8
9E
FF
EA
D7
9A
69
87
9
7
F
D7
6B
46
1F
FA
85
6
C
Q5
8B
E
EA
A
6B
70
B
69
79
7F
a) Explain the concepts of objective function rank, RPL headers, and metrics in 10
69
9
F
B8
1F
69
85
6
C
BD
9A
70
FB
98
F
AE
6
b) List and explain LTE Variations with the applications where we can use them 10
7
B8
46
69
85
E6
AC
BD
FF
9A
F
98
9
AE
01
57
CF
7
Q6
46
69
6
D
7
9E
F
EA
B8
9A
6B
F
57
F
D7
98
69
FA
E6
8
B
1F
FB
79
F
AE
96
D7
0
85
AC
F6
F
6B
FB
F
8B
4
AE
1
D7
9A
69
AC
7
69
F
B8
6B
1F
E6
F
4
AE
D7
9A
70
98
69
79
FF
8
6B
46
1F
E6
****************
8B
D7
9A
70
69
9
69
57
B8
6B
1F
E6
A4
B8
70
98
69
9
57
9
CF
B8
46
1F
E6
B8
EA
70
98
9
57
69
CF
B8
46
B8
9E
EA
9A
98
57
CF
46
FA
E6
B8
EA
9A
79
F
41493 Page 1 of 1
CF
D7
FA
85
E6
EA
6B
FB
79
F
D7
FA
85
AC
B
FB
7F
696BD7FFAEACFB8579E69A4698B8701F
AE
96