0% found this document useful (0 votes)
2 views1 page

Unit Test 2 - Css (Comp)

The document outlines the Internal Assessment for the Computer Engineering Department for the academic year 2024-2025, focusing on the subject of Cryptography & System Security. It includes various questions related to digital signatures, TCP/IP vulnerabilities, worms, viruses, buffer overflow attacks, ICMP flood attacks, and authentication protocols. The assessment is approved by AICTE and affiliated with the University of Mumbai, with a total of 20 marks allocated for the exam.

Uploaded by

yoceban962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views1 page

Unit Test 2 - Css (Comp)

The document outlines the Internal Assessment for the Computer Engineering Department for the academic year 2024-2025, focusing on the subject of Cryptography & System Security. It includes various questions related to digital signatures, TCP/IP vulnerabilities, worms, viruses, buffer overflow attacks, ICMP flood attacks, and authentication protocols. The assessment is approved by AICTE and affiliated with the University of Mumbai, with a total of 20 marks allocated for the exam.

Uploaded by

yoceban962
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ESTD–(2010) DTECODE:EN3351

InnovativeEngineers’andTeachers’EducationSociety’s

ApprovedbyAICTE,DTE&AffiliatedtoUniversityofMumbai,NAACAccredited

COMPUTER ENGINEERING DEPARTMENT


Academic Year (2024-2025)
INTERNAL ASSESSMENT-1I

SUBJECT:Cryptography & System Security (CSC602) Max.Marks:20


DATE:17/04/2025 Duration: 1 hr.
CLASS:TE Sem: VI.

Q.N. Questions Marks CO BL PO PICODE


Q.1a Explain Digital signature scheme with RSA 5 CO4 BL3 PO4 PI 4.6.1

OR
Q.1b Explain TCP/IP Vulnerabilities layer wise. 5 CO4 BL2 PO4 PI 4.2.1

Q.2a Explain worms and viruses 5 CO5 BL2 PO5 PI 5.4.1


OR
Q.2b Explain Buffer overflow attack. 5 CO6 BL2 PO6 PI 6.4.1

Q.3a What is ICMP flood attack? Explain in detail. 10 CO6 BL2 PO6 PI 6.4.3
OR
Q.3b Explain Needham-Schroeder authentication protocol. 10 CO5 BL1 PO5 PI 5.7.1

Add:Opp.GajananMaharajTemple,Kanhor,Badlapur(W),Tal:Ambernath,Dist:Thane421503,Mumbai
Web:bharatenggcollege.comEmail:Phone:7666615915

You might also like