0% found this document useful (0 votes)
28 views1 page

Technology - Mca Master of Computer Applications - Semester 2 - 2023 - December - Information Security Rev 2019 C Scheme

Uploaded by

affiginia dkhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views1 page

Technology - Mca Master of Computer Applications - Semester 2 - 2023 - December - Information Security Rev 2019 C Scheme

Uploaded by

affiginia dkhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

D9

05

8
A

E0

AD
Paper / Subject Code: 70653 / Information Security

88

E2

75
AA
77

D9
05

00

D
4A

88

E2

AE

75

9A
1T00162 - M.C.A. (SEM-II) (R-2020-21) / 70653 - Information Security

77
FC

05

00
A

D
QP CODE: 10043747 DATE : 4 JAN 2024

E2

E
01

75
8
4

A
7
FC

05
E0

00
2A
7
4A

AE
46

01

5E
Time: 3 Hours Max. Marks: 80

7
FC
FE

A
7

0
6E

0
4A

88

E2

AE
01
D8

77
FC

05
E

E0

A
9A

4A
Q.1 is Compulsory

E2
6

01
D8

8
5D

7
FC

5
FE

0
A

7

80
E
07
Solve any three Questions from Q 2, Q 3, Q 4, Q 5 ,Q 6

4A
9

46

01
8

78
5D
E0

C
E

0
9A

7
E
AA

1F
07

4A

8
6
8

78
D
E0

00
D
E2

FC
FE
5

9A

7
E
AA

4A
05

46

01
D8
D
0
88

E2

FC
AE
Q.1 A) Explain PGP (5M)

FE

E0
75

A
7

D9
05

00

46

01
8
2A
A7

D
B) Explain Kerberos. (5M)
88

AE

0
75

9A
5E
4

6E

F
F
7
FC

01
D8
A
A7

C) Discuss Digital Certificate (5M)

D
0

E4
88

AE

E0
01

75

A
5E
4

8F
7
FC

D9
E0

00

46
D) Discuss Phone Rootkits. (5M)

A
A7

80

AD
E2

FE
46

01

75
78
4

AA
FC

D9
5
FE

E0

00

D8
A7

8 0

E2

AE
46

01

5
D8

9A
78
C4

07
Q.2 A) Explain Modes of Operation of Block Cipher CBC and OFB in detail. (10M)

5
FE

E0

A
9A

5D
80

E0
F

4A

E2
46

01
D8

78
5D

AA

07
B) What is SHA -512? Explain SHA- 512 in detail. (10M)
FC

05
FE

E0
9A

E0
07

4A

E2
46

01
D8

8
5D
E0

AA
77
FC

5
FE

0
9A

80
6E
AA

07

4A

E2
Q.3 A) Discuss Inference. What are the various approaches to deal with it? (10M)
1
D8

78
5D
E0

E4

00
E2

FC

05
9A

7
E
AA

07

B) What is Firewall? Discuss its types in detail. 4A (10M)

88
05

46

01
D8
5D
E0

77
88

E2

FC
FE

E0
9A
AA

07

4A
7

05

46

1
D8
A7

5D
E0

00
88

E2

FC
FE

Q.4) A) What is IDS? Explain Statistical Anomaly Detection and Rule based Detection. (10M)
9A
4

6E
AA

07
7
FC

05

01
D8
A7

5D
E0

E4

B) Explain SSL Handshake Protocol in detail. (10M)


88

E2

E0
01

A
4

AA

07

8F
77
FC

D9
05
E0

46
E0

AD
4A

88

E2

FE
6

01

75
E4

AA
77
FC

D9
05
E0

00

D8

Q.5 A) Using Euclidean algorithm, find the greatest common divisor of the following:
4A

88

E2

AE
46

01

75

9A
77
FC

i) 74 and 383 ii) 687 and 24 (10M)


05
FE

E0

0
A

5D
E0
4A

88

E2
6

01
D8

E4

AA

07

B) Explain RSA algorithm with example. (10M)


77
FC

05
E0
9A

E0
8F

4A

88

E2
6

01
5D

E4

AA
AD

77
FC

05
E0
8F

4A

E2
D9

01

Q.6 A) Explain Digital Encryption Standard (DES) in detail. (10M)


78
E4
AD

FC

05
E0
75

7
8F

4A

88
D9

B) What are the different security services? Explain each in brief with example. (10M)
00

01
E4
AD

77
FC
AE

E0
75

8F

4A
D9
00

46

01
2A

AD

FC
AE

FE

E0
75

________________________
D9
00

46

01
D8
2A

AE

FE

E0
75

9A
5E

00

46
D8
2A

5D
80

AE

FE
9A
78

5E

07

D8
2A
A7

5D
80

E0

9A
78

5E

AA

07
A7

5D
80

E0
E2
78
C4

AA

07
05
A7

E0
1F

88

E2

43747 Page 1 of 1
C4

AA
00

77

05
6E

1F

4A

88

E2
0

77
FC

05
E0

4A

E46E001FC4A778805E2AAE0075D9AD8F
88
46

01

You might also like