0% found this document useful (0 votes)
11 views2 pages

IS EndSem Q.Paper

This document outlines the mock end-semester examination for the Information Security subject at Sinhgad Academy of Engineering for the academic year 2024-25. It includes instructions for answering questions, a breakdown of questions covering topics such as ElGamal cryptography, RSA algorithm, hash functions, email security, firewalls, and cybercrime. The exam is structured with options for students to choose between different questions and has a maximum score of 70 marks.

Uploaded by

omkarmagdum818
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

IS EndSem Q.Paper

This document outlines the mock end-semester examination for the Information Security subject at Sinhgad Academy of Engineering for the academic year 2024-25. It includes instructions for answering questions, a breakdown of questions covering topics such as ElGamal cryptography, RSA algorithm, hash functions, email security, firewalls, and cybercrime. The exam is structured with options for students to choose between different questions and has a maximum score of 70 marks.

Uploaded by

omkarmagdum818
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sinhgad Technical Education Society’s

SINHGAD ACADEMY OF ENGINEERING,


S.No.40,Kondhwa(Bk),Kondhwa–Saswad Road,Pune–411048.

Examination: Mock End Sem


AcademicYear:2024-25 Class: TE (Computer Engineering)
SubjectCode:310254 Subject Name: Information Security
Max.Marks:70 Time:2.30Minutes
Day: Date:

Instructions:
1) Answer Q.1or Q.2,Q.3 or Q.4,Q.5or Q.6,Q.7 or Q.8
2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.
SR.NO QUESTION Mark CO CL KL

Q1 a) Define ElGamel cryptography. Explain It in detail. 5 CO3 U C

State and Prove Fermat’s theorem? 6 CO3 U P


b)
What are the different types of attacks possible on RSA? 7 CO3 U C
c) Explain in brief
OR
Q2 a) Describe the ways in which key distribution can be achieved 5 CO3 R,U F
between two parties A & B, in Symmetric encryption.

Explain the “Man in the Middle Attack in Diffie-Hellman Key 6 CO3 R,U F
b) Exchange Algorithm with example.
7 CO3 R,U F
c) Explain RSA Algorithm in details along with suitable example.

Q3a) What are the requirements for a hash function? Explain a simple 8 CO4 R C
hash function.

b) Explain MD5 message digest algorithm. 9 CO4 R,U C

OR
Q4a) Write a short note on Email Security. 4 CO4 A P

b) Write the issues in web security. 5 CO4 A P

c) What is digital signature? Explain the steps to create a digital 8 CO4 R,U C
signature.

P .T.O
Q5a) Explain the need and types of firewall. 5 CO5 R,U C,

b) Explain the attacks on Network and system Security 4 CO5 R,U C

C) What is Intrusion Detection System (IDS)? Enlist and explain 9 CO5 U F


different types of IDS.

OR
Q6a) Write short note on 9 CO5 U C
i) DMZ Network
ii) Host based and Network Based Honeypot
b) What are the issues in information security and network 9 CO5 U F
security? How they can be solved?

Q7a) Explain working of Proxy servers and Anonymizers. 8 CO6 R,U C

b) Explain Challenges to Indian Law and Cybercrime 9 CO6 R,U C


Scenario in India.

OR
Q8a) Explain Staffing the security in detail. 8 CO6 R,U C

b) Explain in detail the classification of cybercrime. 9 CO6 R,U C

[Subject Teacher] [Domain Head] [HOD Comp Engg. Dept]

……………………………BESTLUCK………………………………

You might also like