0% found this document useful (0 votes)
46 views

CSS 2024 Question Paper (Analysis)

Uploaded by

62.SHRUTI KAMBLE
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views

CSS 2024 Question Paper (Analysis)

Uploaded by

62.SHRUTI KAMBLE
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

Unlock the secrets to scoring 10 CGPA with TE COMPS QP


Setter :

🔍 Access 4-6 years of past question papers


💡 Detailed analysis to pinpoint repeated questions

📝 Comprehensive study materials for each subject


"Prepare smarter, not harder! Join now. 📝💡"


📝 NOTE :
● { M n} = Module Number / Module subtopic number.

● Colour Scheme :
RED : Utmost Important
ORANGE : Significant
YELLOW : Considerable
GREEN : Relevant

CSS PYQ ANALYSIS


(Repeated Questions, Module & Marks)

Why are Digital Signatures & Digital certificates required?


What is the significance of Dual Signature? [10 MARKS] {M
4.2} (Repeated 10 Times)

PGP TOPIC : (Repeated 10 Times)


Q. What is a Denial of service attack? What are the different
ways in which an attacker can mount a DoS attack? [10
MARKS] {M 5.2} (Repeated 9 Times)
v) Key generation in IDEA {M 6} (Repeated 9 Times)
Q. Explain the working of Kerberos. [10 MARKS] {M 2.3}
(Repeated 9 Times)

List the functions of the different protocols of SSL. (Repeated


8-10 Times) {M 5.3}
Explain the handshake protocol (Repeated 8 Times) {M 5.3}
v) Role of S-box (Repeated 8 Times)

Q. In an RSA system, the public key (e,n) of user A is defined


as (7,119). Calculate On and private key d. What is the
ciphertext when you encrypt message m=10, using the public
key? [10 MARKS]
{M 2.2} (Repeated 7 Times)
Q. What are the properties of hash functions? What is the role
of a hash in security? [5 MARKS] {M 3.1} (Repeated 7 Times)
transport mode and tunnel mode of IPSec (Repeated 7 Times)
{M 5.3}

Q. What are firewalls? Explain the different types of firewalls


and mention the layer in which they operate. [10 MARKS] {M
5.3} (*Repeated 6-9 Times)
ii) Buffer overflow attack. (Repeated 6 Times) {M 6}
Q. How does PGP achieve confidentiality and authentication in
emails? {M 5.3} (Repeated 6 Times)
Q. Explain how a key is shared between two parties using the
Diffie-Hellman key exchange algorithm. What is the drawback
of this algorithm? [10 MARKS] {M 2.3} (*Repeated 6-7 Times)
iv) Session Hijacking {M 1.2} (Repeated 6 Times)

5. Possible attacks on DES (Repeated 5 Times)


iv) Weak keys and semi-weak (Repeated 5 Times)
ii) Need for expansion permutation (Repeated 5 Times)
i) Block size and key size (Repeated 5 Times)
Q. What are block ciphers? Explain with examples the CBC
and ECB modes of block ciphers. [5 MARKS] {M 2.1} (Repeated
6 Times)
i) MD-5 and SHA (Repeated 5 Times)
Q. Encrypt "The key is hidden under the door" using the
Playfair cipher with keyword "domestic". {M 1.2} (Repeated 6
Times)

iii) Salami attack (Repeated 4 Times)


ii) Firewall and IDS [10 MARKS] {M 3.1, M 5.3} (Repeated 4
Times)
Q. Explain the significance of an Intrusion Detection System
for securing a network. Compare signature-based and
anomaly-based IDS. [10 MARKS] {M 5.3} (Repeated 4 Times)
iii) SQL injection attack (Repeated 4 Times)
iii) SQL injection attack (Repeated 4 Times)

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

Q. Define the goals of security and specify mechanisms to achieve


each goal. [5 MARKS]
{M 5} (Repeated 3 Times)
Q. Give the format of an X 509 digital certificate and explain the
use of a digital signature in it. {M 2.3} (Repeated 3 Times)
iv) Viruses (Repeated 3 Times)and their types. {M 6}
Q. Define authentication and non-repudiation and show with
examples how each one can be achieved. [5 MARKS] {M 4.1}
(Repeated 3 Times)
Q. Describe triple DES with two DES keys. Is a man-in-the-middle
attack possible on triple DES? [5 MARKS] {M 2.1} (Repeated 3
Times)
Q. Explain with examples, keyed and keyless transposition
ciphers. [5 MARKS] {M 1.2} (Repeated 3 Times)
iii) Avalanche and completeness (Repeated 3 Times)
Q. Explain key rings in PGP. [5 MARKS] {M 2.2} (Repeated 3
Times)
Q. Explain key rings in PGP. [5 MARKS] {M 2.2} (Repeated 3
Times)

ii) Poly-alphabetic cipher (Repeated 2 Times)


Q. Explain the working of DES, detailing the Feistel structure [10
MARKS] {M 2.1} (*Repeated 2-3 Times)
Q. Explain software flaws with examples. [5 MARKS] {M 6}
(*Repeated 2-4 Times)
Q List and explain various types of attacks on an encrypted
message. [5 MARKS] {M 4.2} (Repeated 2 Times)
Q State the rules for finding Euler's phi function. Calculate: [10
MARKS] [M1] (Repeated 2 Times)
- φ(10)
- φ(49)
- φ(343)
Q How does ESP header guarantee confidentiality and integrity of
packet payload? What is an authentication header (AH)? How does

✔️
it protect against a replay attack? [10 MARKS] [M4] / [M5]
(Repeated 2 Times)

✔️
Q Explain the relationship between Security Services and
Mechanisms in detail. [5 MARKS] [M4] (Repeated 2 Times)

✔️
Q Use Hill cipher to encrypt the text "short". The key to be used is
hill. [10] MARKS] [M2] (Repeated 2 Times)

👉🏽 Join: TE COMPS QP Setter 🔥 on Telegram!

You might also like