0% found this document useful (0 votes)
112 views

CSS 2024 Question Paper (Analysis)

Uploaded by

62.SHRUTI KAMBLE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views

CSS 2024 Question Paper (Analysis)

Uploaded by

62.SHRUTI KAMBLE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

Unlock the secrets to scoring 10 CGPA with TE COMPS QP


Setter :

🔍 Access 4-6 years of past question papers


💡 Detailed analysis to pinpoint repeated questions

📝 Comprehensive study materials for each subject


"Prepare smarter, not harder! Join now. 📝💡"


📝 NOTE :
● { M n} = Module Number / Module subtopic number.

● Colour Scheme :
RED : Utmost Important
ORANGE : Significant
YELLOW : Considerable
GREEN : Relevant

CSS PYQ ANALYSIS


(Repeated Questions, Module & Marks)

Why are Digital Signatures & Digital certificates required?


What is the significance of Dual Signature? [10 MARKS] {M
4.2} (Repeated 10 Times)

PGP TOPIC : (Repeated 10 Times)


Q. What is a Denial of service attack? What are the different
ways in which an attacker can mount a DoS attack? [10
MARKS] {M 5.2} (Repeated 9 Times)
v) Key generation in IDEA {M 6} (Repeated 9 Times)
Q. Explain the working of Kerberos. [10 MARKS] {M 2.3}
(Repeated 9 Times)

List the functions of the different protocols of SSL. (Repeated


8-10 Times) {M 5.3}
Explain the handshake protocol (Repeated 8 Times) {M 5.3}
v) Role of S-box (Repeated 8 Times)

Q. In an RSA system, the public key (e,n) of user A is defined


as (7,119). Calculate On and private key d. What is the
ciphertext when you encrypt message m=10, using the public
key? [10 MARKS]
{M 2.2} (Repeated 7 Times)
Q. What are the properties of hash functions? What is the role
of a hash in security? [5 MARKS] {M 3.1} (Repeated 7 Times)
transport mode and tunnel mode of IPSec (Repeated 7 Times)
{M 5.3}

Q. What are firewalls? Explain the different types of firewalls


and mention the layer in which they operate. [10 MARKS] {M
5.3} (*Repeated 6-9 Times)
ii) Buffer overflow attack. (Repeated 6 Times) {M 6}
Q. How does PGP achieve confidentiality and authentication in
emails? {M 5.3} (Repeated 6 Times)
Q. Explain how a key is shared between two parties using the
Diffie-Hellman key exchange algorithm. What is the drawback
of this algorithm? [10 MARKS] {M 2.3} (*Repeated 6-7 Times)
iv) Session Hijacking {M 1.2} (Repeated 6 Times)

5. Possible attacks on DES (Repeated 5 Times)


iv) Weak keys and semi-weak (Repeated 5 Times)
ii) Need for expansion permutation (Repeated 5 Times)
i) Block size and key size (Repeated 5 Times)
Q. What are block ciphers? Explain with examples the CBC
and ECB modes of block ciphers. [5 MARKS] {M 2.1} (Repeated
6 Times)
i) MD-5 and SHA (Repeated 5 Times)
Q. Encrypt "The key is hidden under the door" using the
Playfair cipher with keyword "domestic". {M 1.2} (Repeated 6
Times)

iii) Salami attack (Repeated 4 Times)


ii) Firewall and IDS [10 MARKS] {M 3.1, M 5.3} (Repeated 4
Times)
Q. Explain the significance of an Intrusion Detection System
for securing a network. Compare signature-based and
anomaly-based IDS. [10 MARKS] {M 5.3} (Repeated 4 Times)
iii) SQL injection attack (Repeated 4 Times)
iii) SQL injection attack (Repeated 4 Times)

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

Q. Define the goals of security and specify mechanisms to achieve


each goal. [5 MARKS]
{M 5} (Repeated 3 Times)
Q. Give the format of an X 509 digital certificate and explain the
use of a digital signature in it. {M 2.3} (Repeated 3 Times)
iv) Viruses (Repeated 3 Times)and their types. {M 6}
Q. Define authentication and non-repudiation and show with
examples how each one can be achieved. [5 MARKS] {M 4.1}
(Repeated 3 Times)
Q. Describe triple DES with two DES keys. Is a man-in-the-middle
attack possible on triple DES? [5 MARKS] {M 2.1} (Repeated 3
Times)
Q. Explain with examples, keyed and keyless transposition
ciphers. [5 MARKS] {M 1.2} (Repeated 3 Times)
iii) Avalanche and completeness (Repeated 3 Times)
Q. Explain key rings in PGP. [5 MARKS] {M 2.2} (Repeated 3
Times)
Q. Explain key rings in PGP. [5 MARKS] {M 2.2} (Repeated 3
Times)

ii) Poly-alphabetic cipher (Repeated 2 Times)


Q. Explain the working of DES, detailing the Feistel structure [10
MARKS] {M 2.1} (*Repeated 2-3 Times)
Q. Explain software flaws with examples. [5 MARKS] {M 6}
(*Repeated 2-4 Times)
Q List and explain various types of attacks on an encrypted
message. [5 MARKS] {M 4.2} (Repeated 2 Times)
Q State the rules for finding Euler's phi function. Calculate: [10
MARKS] [M1] (Repeated 2 Times)
- φ(10)
- φ(49)
- φ(343)
Q How does ESP header guarantee confidentiality and integrity of
packet payload? What is an authentication header (AH)? How does

✔️
it protect against a replay attack? [10 MARKS] [M4] / [M5]
(Repeated 2 Times)

✔️
Q Explain the relationship between Security Services and
Mechanisms in detail. [5 MARKS] [M4] (Repeated 2 Times)

✔️
Q Use Hill cipher to encrypt the text "short". The key to be used is
hill. [10] MARKS] [M2] (Repeated 2 Times)

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

You might also like