IS EndSem Q.Paper
IS EndSem Q.Paper
Instructions:
1) Answer Q.1or Q.2,Q.3 or Q.4,Q.5or Q.6,Q.7 or Q.8
2) Figures to the right indicate full marks.
3) Assume suitable data if necessary.
SR.NO QUESTION Mark CO CL KL
Explain the “Man in the Middle Attack in Diffie-Hellman Key 6 CO3 R,U F
b) Exchange Algorithm with example.
7 CO3 R,U F
c) Explain RSA Algorithm in details along with suitable example.
Q3a) What are the requirements for a hash function? Explain a simple 8 CO4 R C
hash function.
OR
Q4a) Write a short note on Email Security. 4 CO4 A P
c) What is digital signature? Explain the steps to create a digital 8 CO4 R,U C
signature.
P .T.O
Q5a) Explain the need and types of firewall. 5 CO5 R,U C,
OR
Q6a) Write short note on 9 CO5 U C
i) DMZ Network
ii) Host based and Network Based Honeypot
b) What are the issues in information security and network 9 CO5 U F
security? How they can be solved?
OR
Q8a) Explain Staffing the security in detail. 8 CO6 R,U C
……………………………BESTLUCK………………………………