0% found this document useful (0 votes)
45 views5 pages

06 IoT D2023

The document discusses the topic of cryptography and network security, including encryption techniques and protocols to securely transmit information over networks.

Uploaded by

Aaditya Chettiar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views5 pages

06 IoT D2023

The document discusses the topic of cryptography and network security, including encryption techniques and protocols to securely transmit information over networks.

Uploaded by

Aaditya Chettiar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2

2
3B
7E

50

69
45
Paper / Subject Code: 37481 / Cryptography and Network Security

23

2D
D1

06

38
3B
7E

50

69
45
D9

23

2D
D1

06

38
35

B
E

45
D9
3B

35
7

3
D1

38
35
8C

B2
0
7E

50
9
3B
6E

63
D

23
D1
35
C

0
C4
Duration: 3 Hours Maximum Marks: 80

B
E
8

50
9
B
6E

3
69

D
3

23
D1

06
35
8C
C4
2D
N.B.: -

3B
E
9
B
E

17
9

D
45

C3

06
6
6

D
4
2D
38

7E
C

8
1. Question No 1 is Compulsory

D9
B
E
50

69
45

D1
6
2. Solve any three questions out of remaining questions

5
8C
C4
23

D
8

7E
03

D9
2

B
E
3B

9
3. Assume suitable data if required and mention it clearly

C3

1
46
35

D6
4

35

9D
06

38
4. Figures to right indicate full marks

9C

8
2

52

3B
E
B
7E

D
6
5

D6
3

84

5
8C
4
23
D1

B3
9C
0
Q1 Solve any four of following: -

52

6E
B
E

50
D9

C3
D6
7

4
[A] What are the three security objectives for information and information system? 5

4
23
D1

38
35

9C

8
E0

B
[B] How C-Ciphertext and P-Plaintext expressed in Caesar Cipher? Explain with example. 5

E
3B

5
9
3B

C3
46
35

D6
17

84
D

[C] Differentiate between block and stream Cipher. 5

06
35
8C

9C

E8
B2
D

03

52
E
[D] What are Elements of Network Access Control (NAC)? 5
D9
B
6E

46
35

D6
7

63

84
3

[E] What is Intrusion Detection System (IDS)? Give its type. D1 5


35
8C

9C
B2
0
C4

03

52
7E
9
B

[F] List applications of IPsec. 5


6E

D6
3
9

84
D
C3

23
1

06
D6

35

D
C4

03

52
B
E
8

9
52

B
E

35
17

63
9

Q2 [A] What are traditional ciphers? Discuss Hill Cipher substitution method with example.

84
10
D
3
6
D6
84

35
8C

B2
9D

E0
4

03
[B] Explain various transformations of AES encryption in detail. 10
C
03

52

B
E

35
17

63
9

5D
C3
6
35

6
84

B2
9D

E0
4
D

B3
C

8
B2

Q3 [A] Elaborate the steps of key generation using RSA algorithm. In RSA system, what is the
03

52

17

63
9

5D
C3
6
35

D6
63

public key (E, n) and private key (D, n) and Ø (n) of this user if n=187. is defined. If
84

E0
C4

3
E8
B2
E0

03

D9
52

3B

the Ciphertext C =11, What is plaintext? Explain various kind of attacks on RSA

17
9

46
35

D6
17

63

35
8C

algorithm. 10

9D
38

C
B2
9D

E0

52

3B
6E

[B] How security is achieved in the transport and tunnel modes of IPsec? What are security
50

5D
D6
17

63

84
5D

8C
4
23

associations? 10
B3
9C
9D

E0

52
B3

E
3B

C3
46
35

6
17

4
5D
C3

D
06

38

9C

E8
B2
9D

Q4 [A] Explain steps involved for message digest generation using SHA 512. 10
52
B3

7E
E8

46
35

D6
3

84
5D

[B] Explain Kerberos protocol with simplified overview. 10


C3

06
46

9C
B2
9D

52
B3

E
9C

0
6E

35

D6
17

63

84
5D
C3

Q5 [A] What are various types of Malicious software? Explain phishing attack. 10
B2
9D

0
4

03

52
B3

E
9C

E8

[B] Explain operation of TLS Record Protocol.


35
17

84
5D
C3

06
46
6

10
B2
9D
2D

03
B3

E
9C

E8

35
17

63
5D
5

C3
46
6
84

B2
9D

0
2D

Q6 [A] Explain EAP protocol exchanges with components involved. 10


B3

E
9C

E8
03

17

63
5D

[B] Explain Transport mode and Tunnel mode of IPsec?


5

10
C3
46
6
84

9D

E0
2D

3
9C

E8
3

3B

17
50

5D
5

46
6
84

8C

9D
3

2D

3
9C
B2

3B
E
50

5D
5

46
6
63

**************
84

8C
23

2D

B3
C
E0

6E
3B

50

9
5

C3
6
84

4
23

2D
06

9C

E8
3
3B
7E

50

46
D6
84
23
1

06

9C
9D

2
3B
7E

50

45

D6
D

23
1

06

8
35

9D

52
3B
7E

50

84
D

23
1

06
35

9D

03
3B
7E
3B

35
D

06
35
8C

B2
9D

7E
3B
6E

63
D

41855
35
8C

9D

E0
C4

B
6E

17
5D
C3

9D
C4

B3

C46E8C3B35D9D17E063B235038452D69
E8
A3

4A

5F
17

B
Paper / Subject Code: 37487 / Ethical Hacking and Digital Forensic

C0
03

88
02

39
A3

4A

5F
B6

17

B
C0
03

88
02

39
AF

A3

4A

5F
B6

17
71

88
2

39
F
A7

0
0
A

A3

A
6

7
71
76

FB

31

4
Duration: 3hrs [Max Marks:80]

9
7
7B

30
60

3
A
A

17
1

A
76
B9

4
7

3
2

39
AF
N.B. : (1) Question No 1 is Compulsory.

A7
B

0
0
C0

A3
97

B6

17
71
76
(2) Attempt any three questions out of the remaining five.

5F

3
02
F
7
B

30
C0

A
88
(3) All questions carry equal marks.

A
7

B6
1

A
76
B9
4A

5F

2
AF
A7
7B

0
0
88
39

B6
C
2Q1 1 Attempt any FOUR. [20]

71

A
76
9
A

F
17

02
F
5

7
4

B
0
3

1A
88

6A
9
a Explain the following terms: (any five)s

97

B6
FC
30

A
7

7
7
B
2A

AF
1

7
4
a. Bit-stream image b. Chain of custody c. Evidence custody form d. Evidence bags e.

B
0
3

A
39

7
FC
0

A8
60

71
76
9
A3
Repeatable findings f. forensic workstations

17

0B
FB

7
4

B
3

8
2

6A
9

7
C
30

8
b Give classification of hackers.
60

3
1A

9
A

F
7

77
7
B
A
FB

85
4

B
77

0
03
2

6A
9
c Briefly explain what an expert witness and scientific witness is?

97
FC
A8
0

73
1A
6A

3
B6

B7
0B
A

85
94
77
B7

3
02
F

d How can email be used as evidence?

97
FC
0

8
3
A
6A

A
97

B6

17

0B
1

85
94
7
B7

e Write a note on enumeration techniques and tools.


0B

03
2
AF
7

FC
A8
0

3
6A

3
97

6
FC

7
1

A
B

31

85
94
7
B7
0B

2
AF
85

30

A8
60

73
A
97
FC
A8

2 a Define digital forensics. Explain the need of digital forensics along with the lifecycle of [10]

2A
6

FB

31

94
77
7
0B
85
94

30
60

73
1A
6A
7
FC

digital forensics.
A8
73

2A
9

FB

31
7
7
0B
31

85

7
94

7B

30
0
1A
6A

b Explain the goal of incident response. Mention incidence response methodology with [10]

B6
FC
0

A8
73

2A
9
A3

7
B7
B

AF
31

85

A7
94

suitable diagram.

60
0
02

7
FC
0

A8
73

71
6
B9

FB
A3
6

7
FB

31

85

A7
94

B
C0

1A
02

97
0

8
73
1A

76
A3

F
B6

77
3 a Explain the importance of evidence handling in digital forensics. [10]
B
31

85
4

7B
77

0
02

6A
39
AF

FC
0

A8
6A

B9
A3

b Explain forensics analysis of the data acquired from any one of the operating system. [10]
B6

17

B7
71

85
94
B7

C0
03
02
AF
A7

97
8
73
A3

4A
7

5F
B6

0B
71
76
B9

31

88
02

39
AF
A7

4 a Explain the data acquisition in network forensics in detail. [10]


B

FC
30

A
97

B6

7
71

A
76

31

85
94
0B

b Define data carving. List and discuss differ tools for forensic analysis. [10]
02
AF
A7
B

30

A8
73
97

B6
FC

71

2A
76

31

94
0B

AF
85

A7
B

0
60

73
A3
97
FC
A8

71
76

5 a Explain the goal of forensic report writing. Give the outline of the report. [10]
B

31
0B

02
AF
85

A7
B

30
97

B6
FC
A8

b Point out the features of Forensic Duplication and Investigation & also outline the [10]
71

2A
76
0B

AF
85

A7
4

problems and challenges forensic examiners face when preparing and processing
60
39

97
FC
A8

71
76

FB
7

investigations, including the ideas and questions they must consider.


0B
31

85

A7
4

1A
39

97
FC
30

A8

76
17

77
0B
85
4

7B
03

6A
39

6 a Explain various stages in penetration testing. [10]


FC
A8

9
3

17

B7
0B
2A

85
4

b Write short note on the following [10]


03

39

97
FC
A8
60

17

i) Footprinting
0B
2A
FB

85
4
03

39

FC
8

ii) Ethical hacking


60
1A

4A
17
2A
FB

85

************************
03

39

8
60
A

4A
17
71

2A
FB

03

39
7

60
A
6A

17

42782 Page 1 of 1
71

2A
FB
7

03
7
7B

60
A
6A

A3
71

FB
B7

02
7

A
6A

97B76A771AFB602A30317394A885FC0B
97

B6
71
30
2B

0
A

9
EB
Paper / Subject Code: 37484 / Web X.0

52
20
9F
9C

09
A7

30
2B
24

EB

52
20
9F
9C
FF

09
A7

30
2B
D7

24

EB
0
9F
9C
FF
AF

2
A7

30
2B
Time :(3 hrs.) Maximum Marks = 80

4
1F

F2

0
9F
9C
AF

72
0F

F
NB:

2B
7

03
95

1F

9F
9C
FF
F

72
52

F
1. Question No. 1 is compulsory and solve any THREE questions from remaining

FA

2B
50

D7

24

FA
09

9
questions

C
FF
F
EB

B9
F

9
A
5

4
2. Assume suitable data if necessary

1F
30

2
FD

2
0

9C
F
B

52
20
3. Draw clean and neat diagrams

0F

F
A
E

24
9
A7

95

F
30

C2
FD
0

F
EB

52
0

F
9F

7F

49
FA
72

50
09
0
Q1 2B Marks

FD

F2
A

9
3

F1
B

2
0
F

7F
9C
.

FA
5
2

50
9

09
7

0
2B

FD
24

a. Differentiate RDBMS v/s MongoDB 5

9
3

1
EB

52
20

F
9F
9C
FF

FA
50
09
A7

30
B

D
D7

24

29

F1
b. Explain Multilevel inheritance in TypeScript with example 5
2

AF
B
0
9F
9C
F
AF

95
72

0E

50
F

1F
2B
D7

B0
FA
c. Explain Asynchronous programming 5

29
3
1F

0F
9C
FF
F

95
72

0E
B9
0F

95
d. What is expressions in AngularJS 5
7

24

B0
FA

3
95

1F

C2
D

52
20
F
F

0E
52

B9
F

09
7
A

Q2 a. Explain components of Semantic Web stack. 10


0

FA
09

03
5

1F

C2
FD

EB
29

.
FF
EB

72
B9
F

49
A
95

30
0

b. Illustrate Streams in Nodejs 10

A
5

F
30

2
FD

F2
0

20
9F
9

C
EB

2
20

7F

49

A7
FA
5

Q3 a. Explain AngularJS ng-app, ng-init, ng-model directive with examples

B
10
0
09
A7

5
0

C2
FD

F2

9F
9
3

F1

.
EB

2
0
9F

7F

49
A
5
2

2B
50

b Explain CRUD operations in MongoDB with example 10


09
A7

F
0
2B

F2
9
03

F1

9C
AF
B

52
9F

7F
9C

72

Q4 a. Construct a Simple application for AngularJs form Validation. it will 10


50

24
09

1F
0
2B

D
24

29
3

FF
AF

check if an email is valid or not. Draw a mock UI of the Output.


B
0

0F
9F
9C
FF

95
2

D7
A7

1F
0
2B
D7

B0

29
3
2

AF

b. Explain different methods available in the networking module of Node.js. 10


0

0F
9F
C
F
AF

95
2

0E
7F

95

1F
2B
4

B0
FA

3
1F

Q5 a.
D

Explain REST API in detail.


2

10
52
20

0F
9C
F
AF

0E
B9
0F

09
7

95
D7

24

FA

03
95

C2

EB

b. State the significance of the Request Object in Express.js. Also, explain 10


52
1

FF
F

72
B9
0F

09
A

the different properties of Express.js Request Object.


0
7

24

03
5

2
FD

EB
9F
9

Q6 a.
1

Explain functions in TypeScript with suitable example 10


C
F

72
2

0F

49
FA
5

30
B
7

A
09

95

C2
FD

F2

20
9F
1

b. Explain Express.js Cookies management with example 10


EB

52

7F

49

A7
FA

2B
50
09
30

F2

9F
9

F1

9C
F
EB

7F
FA
5

2B
50

4
9
30

2
0

29

F1

________________
9C
FF
AF
EB
0

95
2

50

D7

24
7

1F
30

B0
FA

29

FF
AF
20

0F
95
0E
B9

D7
7

95

1F
B0
A

AF
2
0

0F
9F

95
2

0E
7

95

1F
2B

B0
FA

03

52

0F
9C

72

0E
B9

09

95
24

FA

03
C2

EB

52
F

72
B9
7F

09
30
4

A
C2
F2

EB
0
9F

72
7F

49

30
2B

A
FD

F2

20
9F
C
7F

49

A7
FA

2B

41847 Page 1 of 1
FD

F2

9F
1

9C
0F

7F
FA

2B
24
FD
F1

9C
FF
FA
50

50F1FAFD7FF249C2B9FA72030EB09529
D7

24
8
70
F7

EF

22
Paper / Subject Code: 37483 / Blockchain Technology

49
39

D2
85
01
79
F8

EF
97

22
9F
51

2
94

85
01
83

2D
CF

F7

EF
7
1F

52
39
6E

01
F5

F8
8

7
75

7
C

49

E
Duration: 3hrs [Max Marks:80]

9
EC

1
5

9
6

0
F

F8

F
5

7
39

EC

9F
7

1E
51
EC

94
D2

83
6

70
CF

F7
75
N.B. : (1) Question No 1 is Compulsory.

9
22

1F

49
3

39
EC

E
D2
85
(2) Attempt any three questions out of the remaining five.

79
6

8
5
EF

39
2

1F

F
C7
(3) All questions carry equal marks.

9
6E
D2
5
01

3
9E
F8
(4) Assume suitable data, if required and state it clearly.

8
5
97

22

9F
C7
3
1E

51
6E
D2
94

85

3
9E
70

CF

8
5
F7

22

1F
7
3
49

E
1 Attempt any FOUR [20]

EC

6E
39

2
85
01

F5
2D
79
F8

5
EF

39
7

EC
C7
F
a Explain structure of block in blockchain

52
51

2
4

01
3

56
D

E
79

F8
CF

9
97

2
b What are different types of blockchain?

EC
F

C7
F

3
E

52
1

9
6E

D2
94

01
5

56
9E
F8
F

c Explain the concept of block headers and how they are used to link blocks in a
8

F7
75

97

22
C

1F

C7
23
1E
9
EC

6E

blockchain.

94

85
F5

83

9E
70
F7

F
75

22
d Explain architecture of ethereum.
39

23
49

E
1

39
EC

5
D2

1
F5

2D
79

8
6

0
e Describe the role of Metamask in the Ethereum ecosystem. F8

F
5

7
9
22

EC

F
7

49

52
3

51

39
EC
D2

01
85

79

F8
56

F8

97
2 a Discuss the concept of a Bitcoin wallet. What are the different types of wallets, [10]
EF

9
2

F
7

1E
3
2

51

9
EC

6E

94
2
5
01

and how do they manage private keys and facilitate transactions?

3
D

70
8

CF

F7
5
F

39
97

22

1F
b Describe the role and responsibilities of peer nodes in the Hyperledger Fabric [10]
C7

49
E

39
6E
D2
94

85
1

79
architecture. Also discuss the concept of channels in Hyperledger Fabric.
9E
0

8
5
F7

EF
7

22

EC

1F

9F
C7
3
49
39

D2
85
1

F5

83
56
9E
79

70

3 a Describe the step-by-step process of a typical Bitcoin transaction. Include the [10]
F8

22

EC

1F
C7
9F

3
49

roles of the sender, recipient, miners, and the blockchain network.


51

D2
85
1

F5
3

56
9E
79

0
CF

b What are the essential tools and frameworks for setting up a development [10]
EF
97

EC
1F

C7
F

23
52
9
6E

94

environment for Solidity programming? Discuss the role of tools like Remix and
01
F5

56
2D

9E
F8
8

7
75

97

Truffle in the development process.


C

1F

C7
F

23
E

52
9
EC

94

01
F5

83

2D

9E
F8
6

F7
5

97
39

EC

1F
7

Discuss the purpose and significance of Bitcoin relay networks. How do they
23

4 a [10]
E

52
39
EC

94
D2

01
F5

2D
F8
56

improve the propagation of transactions and blocks within the network?


F8

F7

7
9

C
7

49

1E

52
3

b Define ERC721 tokens and explain their primary purpose. How do ERC721 [10]
51

39
EC

E
D2

79

F8
6

70
F

F8

tokens differ from ERC20 tokens in terms of ownership and uniqueness?


5
9
22

F
7

49

1E
3

51

39
EC

E
2
85

79
56
D

70
F

F8
F

39

5 a Provide an overview of the Truffle framework. What is its primary purpose in [10]
2

EC

F
7

49
1E

51

39
C
D2
85

the context of blockchain development, and how does it simplify the


79
6
E

CF

8
75
F

39
22

1F

9F

development process?
E

EC

6E
D2
85
01

F5

83

b Contrast the security aspects of ICOs and STOs. How does the classification of [10]
5
EF

39
97

22

EC

1F
C7

tokens (security vs. utility) influence the security of the fundraising process?
D2
94

85
01

F5
56
9E
F7

EF
97

EC
C7
23
2

6 a Describe the roles played by different entities in the RAFT consensus algorithm. [10]
39

5
01

56
2D

9E
79

8
EF

What are the specific responsibilities of leaders, followers, and candidates?


97

C7
F

23
52
9

94

01

b Discuss the key security challenges in traditional IoT architectures. How can [10]
3

2D

9E
F8
F8

97

blockchain address these challenges and provide a more secure foundation for
F

23
E

52
51

39

94

01

IoT deployments?
2D
F8
CF

F8

F7

9 7

1E

52
1

39
6E

4
F5

F8
70
F8

F7
C

***********
49

1E
51

39
6E

79

70
F

F8
75

9F

49
51
EC

6E

83

79
CF
75
39

42065
1F

9F
EC

6E

F5

83
75
39

EC

1F
EC

39EC756ECF51F839F7949701EF8522D2
F5
56
8B
A4

01
B8

9E
Paper / Subject Code: 37482 / IoT Architecture and Protocols

87
69
57

69
CF

8B
A4
B8

9E
EA

0
87
69
57

69
CF
FA

8B
A4
B8

9E
EA
7F

69
57

9
F
A

6
C
BD
[TIME:3 hrs] [Marks:80]

A4
B8

9E
F

A
7F

E
96

57

9
CF
FA

E6
D
Note: 1. Question 1 is compulsory

F6

B8
A

9A
B

79
7F
2. Answer any three out of remaining questions

AE
01

F
9

6
AC
D
87

F6

B8
3. Assume suitable data where required

9E
FF
6B
8B

AE
1

57
F
D7
0

69

AC
7
69

B8
FF
8

B
F
8B
A4

AE
01

CF
7
Q1 Solve any 4

69

D
87
69
69

EA
B
1F

B
a) Illustrate IoT Application Transport Methods 5

F
B
A4
9E

F
7
0
8

69

AC
b) Discuss how low power consumption is essential for prolonging the life of 5

BD
7
69
57

FF
B8

1F
6
battery-operated devices in IoT.

A4

AE
B8

96

7
70
98
9

BD
F6
c) Short note on Communication models & API. 5
57

69
CF

FF
8
46

1
8

9E

96
d) Explain Data Versus Network Analytics 5
EA

D7
A

0
FB

98

F6
57

FF
e) Briefly elaborate the DICE. 5

6B
46
FA

6
C

01
B8

E
A

D7
9A

98

69
9
7F

87
E

57
CF

6B
46

1F
A

E6
Q2
BD

8B
B8
F

9A

69
79
a) Explain Mesh-Under Versus Mesh-Over Routing in 6LoWPAN 10
7F

87
AE

69
96

1F
85

6
AC
BD

b) Explore the Purdue Model for Control Hierarchy and its implications for 10

8B
A4
F6

E
FF

70
B

79
E
01

69
security practices in OT.
96

9
F
D7

B8
A

85

6
C
87

A4
6

E
FF

A
6B
1F

98
79
8B

AE

69
CF
7

Q3
70

46
9

85
D
69

9E
F

EA
8

9A
a) Explain working of AMQP with an example 10
B
1F

B
F
B
A4

96

57
CF
7
0
8

FA

b) Compare and contrast OCTAVE and FAIR 10

E6
BD
87
69

B8
69

EA
1F

79
F
8B
A4
9E

96

CF
7
70

FA

85
D

Q4
9

F6
57

A
B8

B
46

FB
6

a) Examine the considerations for adopting or adapting the Internet Protocol in AE 10


1
8

96

D7
A

0
FB

98
79

AC
7

F6
9

IoT applications.
F
8

6B
46
85

6
AC

F
8B

AE
1
E

b) Explain the importance of the physical layer and MAC (Medium Access 10
D7
A

0
B

9
9

87
AE

F6
57

69
CF

FF
Control) layer in IoT access technologies.
6B
46

8B

01
B8

9E
FF

EA

D7
9A

69
87
9
7
F
D7

6B
46

1F
FA

85

6
C

Q5
8B
E
EA

A
6B

70
B

69
79
7F

a) Explain the concepts of objective function rank, RPL headers, and metrics in 10
69
9
F

B8

1F
69

85

6
C
BD

the context of RPL.


9E
F

9A

70
FB

98
F

AE
6

b) List and explain LTE Variations with the applications where we can use them 10
7

B8
46
69

85

E6
AC
BD

FF

9A
F

98
9
AE
01

57
CF
7

Q6
46
69

6
D
7

9E
F

EA
B8

9A
6B
F

a) Examine the impact of legacy systems on OT security. Discuss how the 10


F
01

57
F
D7
98

69

FA

E6

continued use of outdated technologies poses challenges in terms of


AC
87

8
B
1F

FB

79
F

vulnerabilities, patching, and overall security management.


8B

AE
96

D7
0

85
AC

b) Write short note on 1. IPV6 Ready Logo 2. Functional blocks of IoT 10


87
69

F6

F
6B

FB
F
8B
4

AE
1

D7
9A

69

AC
7
69

F
B8

6B
1F
E6

F
4

AE
D7
9A

70
98

69
79

FF
8

6B
46

1F
E6

****************
8B

D7
9A

70

69
9

69
57

B8

6B
1F
E6

A4
B8

70
98

69
9
57

9
CF

B8
46

1F
E6
B8
EA

70
98
9
57

69
CF

B8
46
B8

9E
EA

9A

98
57
CF

46
FA

E6
B8
EA

9A
79
F

41493 Page 1 of 1
CF
D7

FA

85

E6
EA
6B

FB

79
F
D7

FA

85
AC
B

FB
7F

696BD7FFAEACFB8579E69A4698B8701F
AE
96

You might also like