IT702A
IT702A
(ii) The cipher which uses the exclusive-or operation as defined in computer 1 CO1 Knowledge,
science is called Comprehension
(a) Caesar cipher
(b) XOR cipher
(c) Cipher
(d) Cipher text
(iii) For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where 1 C02 Application
message=5 and find the cipher text.
(a) C=80
(b) C = 92
(c) C= 56
(d) C = 23
(iv) When a hash function is used to provide message authentication, the 1 CO2 Knowledge,
hash function value is referred to as Comprehension
(a) Message Field
(b) Message Digest
(c) Message Score
(d) Message Leap
(ix) A small program that changes the way a computer operates. 1 CO1 Knowledge,
(a) Worm Comprehension
(b) Trojan
(c) Virus
(d) Bomb
(xi) How many layers are there in the OSI reference model? 1 CO3 Comprehension
(a) 4
(b) 5
(c) 6
(d) 7
GROUP – B
(Short Answer Type Questions)
Answer any three from the following: 3×5 = 15
SL Question Marks Co Blooms
Taxonomy
Level
2. (a) What are passive threats and active threats? 2 CO1 Knowledge,
Odd semester theory examination 2022 under autonomy, 14th-DEC-22
Page 2 of 4
NARULA INSTITUTE OF TECHNOLOGY
An Autonomous Institute under MAKAUT
Comprehension,
Application
(b) Differentiate between passive threats and active threats. 3 CO1 Knowledge,
Comprehension
3. List and briefly explain different types of Firewalls. 5 CO3 Knowledge,
Comprehension
4. (a) What is PGP? 3 CO3 Knowledge,
Comprehension
(b) What is ‘packet snooping’ and ‘packet spoofing’? 2 CO1 Knowledge
CO2
5. (a) What is key wrapping? 2 CO2 Application
(b) How is key wrapping useful? 3 CO2 Application
6. Explain Cipher Block Chaining mode with a suitable diagram. 5 CO1 Knowledge
GROUP – C
(Long Answer Type Questions)
Answer any three from the following: 3×15=45
SL. Question Marks Co Blooms
Taxonomy
Level
7. (a) What is the difference between stream cipher and block cipher? 2 CO1 Knowledge,
Comprehension,
Application
(b) What types of attacks may occur on block ciphers? 4 CO1 Knowledge
(c) Describe a single round of DES with block diagram. 7 CO3 Knowledge,
CO4 Comprehension
(d) “Authentication can be achieved using DES”- Comment on it. 2 CO3 Knowledge,
CO4 Comprehension,
Application
8. (a) What is electronic money? 2 CO3 Knowledge
(b) What is SET? Explain with a suitable model. 7 CO3 Knowledge,
Comprehension
(c) How pre-master-secret and master-secret is prepared in SSL 3 CO3 Comprehension
handshake protocol?
(d) Describe the fields of SSL record protocol header. 3 CO3 Knowledge
9. (a) Explain with the figure how secure socket layer (SSL) is 5 CO3 Knowledge,
accommodated in TCP/IP protocol suite. Comprehension
(b) Explain briefly, in the PGP, that how Bob and Alice exchange the 7 CO3 Application
secret key for encrypting messages.
(c) What are the different security services provided by PGP? 3 CO3 Knowledge,
Comprehension
10. (a) Briefly describe the RSA algorithm and show how it provides security 9 CO2 Knowledge,
to message / data. Comprehension,
Application
(b) How digital signatures can be generated? 4 CO2 Knowledge
(c) What does digital signatures provide to a message? 2 CO3 Comprehension
11. (a) What are the differences between symmetric key and asymmetric key 3 CO1 Knowledge,
cryptography? Comprehension,
Odd semester theory examination 2022 under autonomy, 14th-DEC-22
Page 3 of 4
NARULA INSTITUTE OF TECHNOLOGY
An Autonomous Institute under MAKAUT
Application
(b) What do you mean by message digest? 3 CO2 Comprehension
CO3
(c) What is a digital envelope? Explain, how it works. 2+3 CO2 Knowledge,
CO3 Comprehension
(d) What is firewall? What are the limitations of firewall? 2+2 CO3 Knowledge,
Comprehension,
Application