0% found this document useful (0 votes)
27 views2 pages

Network Security QP

Uploaded by

hell hacker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views2 pages

Network Security QP

Uploaded by

hell hacker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reg. No.

4Aalolals
Question Paper Code : 20417

B.E/BTech. DEGREE EXAMINATIONS, NOVEMBER/DECEMBER 2023.


Fifth Semester

Computer Science and Engineering


CCS 354- NETWORK SECURITY

(Common to :Computer Science and Engineering (Artificial Intelligence and


Machine Learning)/Computer and Communication Engineering/Artificial
Intelligence and Data Science and Information Technology)
(Regulations 2021)
Time :Three hours Maximum: 100 marks
Answer ALL questions.
PART A -(10 >x 2= 20 marks)
1 Define the term cryptography.
2. Classify the basic functions used in encryption algorithms.
3. Write the roles of public and private key.
4. What requirements must a public key cryptosystem should satisfy to fulfill
security?

5 State the protocols used to provide IP security.


6. Expand HTTPS standard. Give its uses.

7. Generalize the importance of application level security.


8. Examine the mobile device security components with its uses.
9. Point out thedesign goals of firewalls.
10. Identify the characteristics of block chain security
PART B(5x 13 = 65 marks)

11. (a) Compose conventional and public-key cryptography mechanisms with its
algorithm.
Or

(b) Explain the digital signature algorithm and evaluate the process of IDSS
signing and verification.

12. (a) In what way remote user authentication is achieved? Explain their
encryption types with its features.
Or

Illustrate the key distribution scenario with an example. Discuss the uses
(b)
of X.509 Certificates in detail.

13. (a) Discuss in detail about the steps involved in IEEE 802. 1X Port. Based
Network Access Control. Give example.
Or

Illustrate the working principle of Secure Sockets Layer and relate it for
(b)
E-Commerce applications.

14. (a) Describe the message format, message transfer and the underlving
protocol involved in the working of the electronic mail security.
Or

(b) Describe in detail about five header fields defined in MIME. Discuss the
role of LDomain Keys with an example.

15. (a) Explain how firewalls help in the establishing a security framework for
an organization. Give suitable examples.
Or
(b) Generalize the role of intrusion detection system. llustrate the steps
involved in the Intrusion Detection Password Management system?
PARTC(1x15 = 15marks)

(a) ) Formulate the steps involved with hash functions. (8)


16.
(i1) Design the Distribution strategy of Public Keys with an example. (7)
Or

(b) Elaborate the process of generating encryption keys based on password in


Kerberos. Depict the complete authentication procedure of Kerberos in
detail and justify how it could be applied in real time services.

2 20417

You might also like