Information Technology (Semester 7)
Total marks: 80
Total time: 3 Hours
INSTRUCTIONS
(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Draw neat diagrams wherever necessary.
1.a.
Using the extended Euclidean algorithm, find the multiplicative inverse
of
i) 1234 mod 4321
ii) 24140 mod 40902
(5 marks)
00
1.b.
State with example Euler's theorem.
(5 marks)
00
Or
2.a.
What is the difference between a monoalphabetic cipher and a polyalphabetic cipher? Explain with example.
(5 marks)
00
2.b.
What four requirements were defined for Kerberos?
(5 marks)
00
3.a.
What characteristics are needed in a secure hash function?
(5 marks)
00
3.b.
What protocols comprise SSL? Draw a neat diagram? What is the difference between an SSL connection and an SSL session?
(5 marks)
00
Or
4.a.
What services are provided by IPSec? What is the difference between
transport mode and tunnel mode in IPSec?
(5 marks)
00
4.b.
Consider any 5 threats to web security and describe how each is countered
by particular feature of SSL
i) Brute force attacks
ii) Known plaintext attacks
iii) Replay attacks
iv) Man-in-the-middle attacks
v) Password sniffing
vi) IP spoofing
vii) IP hijacking
viii) SYN flooding
(5 marks)
00
5.a.
Illustrate with a neat diagram components of risk identification and risk
assessment.
(8 marks)
00
5.b.
List and explain approaches to reduce impact of vulnerability exploitation through planning and preparation.
(8 marks)
00
Or
6.a.
List and explain any four commandments of computer ethics.
(8 marks)
00
6.b.
Illustrate the significance of IRP, DRP and BCP.
(8 marks)
00
7.a.
What is cybersquatting? Who are cyber squatters and how does it work
(8 marks)
00
7.b.
Classify and explain cybercrimes against property
(8 marks)
00
Or
8.a.
What are social engineering attacks and classify and explain them?
(8 marks)
00
8.b.
Explain in detail Indian legal perspective on cybercrimes.
(8 marks)
00
9.a.
What is a phishing attack explain with an example. What are the different
types of phishing?
(12 marks)
00
9.b.
What is cyberstalking? Explain cyberstalking and explain how it works.
(6 marks)
00
Or
10.a.
List any two network security scanners and explain the significance and
working of the same.
(12 marks)
00
10.b.
What are the properties a digital signature should have?
(6 marks)
00