Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INSTRUCTIONS TO CANDIDATES :
m
15952 15952
1. 15952
SECTIONS-A, B, C &15952
D contains 15952 15952each carrying
T WO questions 15952 T EN marks
15952 each 15952
and students have to attempt any ONE question from each SECT ION.
2.
o
SECTION-E is COMPULSORY consisting of T EN questions carrying T WENT Y
.r c
marks in all.
15952 15952 15952 15952 15952 15952 15952 15952 15952
pe
15952
SECTION-A
15952 15952
o m
15952 15952 15952
a .r c
1. Briefly describe the Shift Rows and Byte Substitution layers of Rijndael. Explain why we
can apply them in either order with the same result.
15952 15952
2
15952
r p 15952 15952
e
15952 15952
a) What is the purpose of a nonce in an end-point authentication protocol?
15952 15952
15952 15952
b
15952 15952 15952
a p
b) What is meant by IP spoofing? How can a router be used to prevent IP spoofing?
15952 15952 15952 15952
rp
c) What is the main drawback of the one time pad cryptosystem?
15952 15952
3.
15952 15952
b
15952
SECTION-B
15952 15952 15952
What are the differences between message confidentiality and message integrity? Can
15952
4. What is the need of database security? Explain various methods using which a database
can be secured in terms of Encryption, Access Control and Authenticates Access.
15952 15952 15952 15952 15952 15952 15952 15952 15952
SECTION-C
15952 15952 15952 15952 15952 15952 15952 15952 15952
15952 1|M
15952 - 7 4 0 7 15952
4 15952 15952 15952 15952 ( S 6 15952
)-118E 15952
6. Which malware programs are known to be most severe in terms of damage that they can
15952 15952
make? 15952
What do you 15952
understand by15952
a stack and a15952 15952
buffer overflow? How are 15952
these two 15952
SECTION-D
7. What are the various approaches to Risk Management? Compare the two approaches to
15952 15952 15952 15952
Risk Prioritization. What is the 15952 15952
difference between Risk 15952
Management 15952
and Risk 15952
Assessment?
8. a) State the complete Information Security Life Cycle. Explain the relevance of each
m
15952 15952 15952 15952 15952 15952 15952 15952 15952
phase.
o
b) What is the need of having company-wide framework for BCM (Business Continuity
.r c
Management)?
15952 15952 15952 15952 15952 15952 15952 15952 15952
pe
15952
SECTION-E
15952 15952
o m
15952 15952 15952
.r c
9. Write briefly :
p a
a. How are AES, DES and triple DES different on the basis of design and features? Also
describe
r e
15952 15952 15952 the operation
15952 of AES algorithm.
15952 15952 15952 15952 15952
a p
b. What requirements must a public key cryptosystem fulfill to be a secure algorithm?
15952of a given15952
user is e = 31,15952
n = 3599. What
15952 is the 15952
rp
private key of the user?
d. What is the major limitation of traditional substitution ciphers? How do the modern
15952 15952 block ciphers address
15952 15952 it?
b
15952 15952 15952 15952
e. What is the major limitation of the traditional one-time pad? How do the modern
stream ciphers address it?
15952
recipient?
15952 2|M
15952 - 7 4 0 7 15952
4 15952 15952 15952 15952 ( S 6 15952
)-118E 15952