0
1.0kviews
Information and Cyber Security Question Paper - Dec 18 - Information Technology (Semester 7) - Pune University (PU)
1 Answer
0
20views

Information and Cyber Security - Dec 18

Information Technology (Semester 7)

Total marks: 80
Total time: 3 Hours
INSTRUCTIONS
(1) Question 1 is compulsory.
(2) Attempt any three from the remaining questions.
(3) Draw neat diagrams wherever necessary.

1.a. Using the extended Euclidean algorithm, find the multiplicative inverse of i) 1234 mod 4321 ii) 24140 mod 40902
(5 marks) 00

1.b. State with example Euler's theorem.
(5 marks) 00

Or

2.a. What is the difference between a monoalphabetic cipher and a polyalphabetic cipher? Explain with example.
(5 marks) 00

2.b. What four requirements were defined for Kerberos?
(5 marks) 00

3.a. What characteristics are needed in a secure hash function?
(5 marks) 00

3.b. What protocols comprise SSL? Draw a neat diagram? What is the difference between an SSL connection and an SSL session?
(5 marks) 00

Or

4.a. What services are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
(5 marks) 00

4.b. Consider any 5 threats to web security and describe how each is countered by particular feature of SSL i) Brute force attacks ii) Known plaintext attacks iii) Replay attacks iv) Man-in-the-middle attacks v) Password sniffing vi) IP spoofing vii) IP hijacking viii) SYN flooding
(5 marks) 00

5.a. Illustrate with a neat diagram components of risk identification and risk assessment.
(8 marks) 00

5.b. List and explain approaches to reduce impact of vulnerability exploitation through planning and preparation.
(8 marks) 00

Or

6.a. List and explain any four commandments of computer ethics.
(8 marks) 00

6.b. Illustrate the significance of IRP, DRP and BCP.
(8 marks) 00

7.a. What is cybersquatting? Who are cyber squatters and how does it work
(8 marks) 00

7.b. Classify and explain cybercrimes against property
(8 marks) 00

Or

8.a. What are social engineering attacks and classify and explain them?
(8 marks) 00

8.b. Explain in detail Indian legal perspective on cybercrimes.
(8 marks) 00

9.a. What is a phishing attack explain with an example. What are the different types of phishing?
(12 marks) 00

9.b. What is cyberstalking? Explain cyberstalking and explain how it works.
(6 marks) 00

Or

10.a. List any two network security scanners and explain the significance and working of the same.
(12 marks) 00

10.b. What are the properties a digital signature should have?
(6 marks) 00

Please log in to add an answer.