System & Web Security : Question Paper Dec 2012 - Information Technology (Semester 6) | Mumbai University (MU)

System & Web Security - Dec 2012

Information Technology (Semester 6)

(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Assume data if required.
(4) Figures to the right indicate full marks.
1(a) Explain Different Birthday problems.(5 marks) 1(b) What are the key principles of security?(5 marks) 1(c) Compare and contrast SHA-1 and MD5.(5 marks) 1(d) Explain Honey Pots.(5 marks) 2(a) How flaw in TCP/IP can cause operating system to become vulnerable? Also explain how Kerberos are used for user authentication in windows?(10 marks) 2(b) For the given values p=19,q=23 and e=3, find ? (n) and d using RSA algorithm.(10 marks) 3(a) What is Buffer overflow and incomplete mediation in software security?(10 marks) 3(b) Explain one time initialization process and processes in each round of advanced encryption standard.(10 marks) 4(a) What is denial of service attack? What are the ways in which a user can mount dos attack on the system?(10 marks) 4(b) Compare Packet Sniffing and Packet Spoofing. Explain session hijacking attack.(10 marks) 5(a) Explain Multi Level Security Model. Also explain multi lateral security.(10 marks) 5(b) What is Malware? Explain Salami and Linearization attacks.(10 marks) 6(a) Explain Software Reverse Engineering. Also explain Digital Rights Management.(10 marks) 6(b) Describe the different types of IDS and their limitations.(10 marks)

Write short notes on (any four) :-

7(a) CAPTCHA(5 marks) 7(b) Access Control Matrix(5 marks) 7(c) Covert Channel(5 marks) 7(d) Firewall(5 marks) 7(e) RC4(5 marks)


Next up

Read More Questions

If you are looking for answer to specific questions, you can search them here. We'll find the best answer for you.


Study Full Subject

If you are looking for good study material, you can checkout our subjects. Hundreds of important topics are covered in them.

Know More