Course: 05, 12
Code: 5019
Time: 2.30 Hrs. M.M.: 75
Section 'A'
Note: Attempt any 10 questions. 10 x 1 = 10
1. If the sender and receiver use different keys, the system is referred to as the asymmetric cryptography system. (True/False)
2. PPTP stands for.......................
3. Output message in cryptography is called as.............
4. MDS algorithm produces............ bit hash value.
5. IDS stand for...........
6. A............is a malware computer program that replicates itself in order to spread to other computers.
7. DES stands for.........
8. IBM designed DES. (True/False)
9. VPN stands for...........
10. In MDS, MD stands for message delivery
11. A ………………………network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
12. SSH stands for............
Section 'B'
Note: Attempt any 5 questions. 5 x 6 = 30
13. What do you mean by cybercrime? Explain.
14. Describe symmetric and asymmetric encryption.
15. What do you mean by Trojan?
16. What are the properties of hashing function in cryptography?
17. What do you mean by PGP?
18. Explain Denial-of-Service attack.
19. Explain the Teardrop attack.
Section 'C'
Note: Attempt any 5 questions. 5 x 7 = 35
20. Explain IT Act 2000.
21. Explain RSA algorithm with example.
22. Explain in detail the operation of a secure socket layer.
23. What are the differences between Active and Passive attacks?
24. What is VPN? Explain it's working.
25. List the characteristics of a good firewall implementation?
26. Describe any two:
(i) Botnet (ii) Hacking (iii) MDS