Sunteți pe pagina 1din 2

15952 15952 15952 15952 15952 15952 15952 15952 15952

15952 Roll No.


15952 15952 15952 15952 15952 Total15952
No. of Pages
15952 : 02 15952

Total No. of Questions : 09


MCA (2015 Batch) (Sem.3)
15952 15952 15952 15952 15952 15952 15952 15952 15952
INFORMATION SECURITY
Subject Code : MCA-302
Paper ID : [74074]
15952 15952 15952 15952 15952 15952 15952 15952 15952
Time : 3 Hrs. Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :

m
15952 15952
1. 15952
SECTIONS-A, B, C &15952
D contains 15952 15952each carrying
T WO questions 15952 T EN marks
15952 each 15952

and students have to attempt any ONE question from each SECT ION.
2.

o
SECTION-E is COMPULSORY consisting of T EN questions carrying T WENT Y

.r c
marks in all.
15952 15952 15952 15952 15952 15952 15952 15952 15952

15952 15952 15952

pe
15952
SECTION-A
15952 15952

o m
15952 15952 15952

a .r c
1. Briefly describe the Shift Rows and Byte Substitution layers of Rijndael. Explain why we
can apply them in either order with the same result.
15952 15952
2
15952

r p 15952 15952

e
15952 15952
a) What is the purpose of a nonce in an end-point authentication protocol?
15952 15952

15952 15952
b
15952 15952 15952

a p
b) What is meant by IP spoofing? How can a router be used to prevent IP spoofing?
15952 15952 15952 15952

rp
c) What is the main drawback of the one time pad cryptosystem?

15952 15952

3.
15952 15952

b
15952
SECTION-B
15952 15952 15952

What are the differences between message confidentiality and message integrity? Can
15952

15952 15952 you have one without15952


15952 the other? Justify
15952your answer.
15952 15952 15952 15952

4. What is the need of database security? Explain various methods using which a database
can be secured in terms of Encryption, Access Control and Authenticates Access.
15952 15952 15952 15952 15952 15952 15952 15952 15952

SECTION-C
15952 15952 15952 15952 15952 15952 15952 15952 15952

5. a) What are different kinds of malware?

b) What are the different methods of malware propagation?


15952 15952 15952 15952 15952 15952 15952 15952 15952

15952 1|M
15952 - 7 4 0 7 15952
4 15952 15952 15952 15952 ( S 6 15952
)-118E 15952

15952 15952 15952 15952 15952 15952 15952 15952 15952


15952 15952 15952 15952 15952 15952 15952 15952 15952

6. Which malware programs are known to be most severe in terms of damage that they can
15952 15952
make? 15952
What do you 15952
understand by15952
a stack and a15952 15952
buffer overflow? How are 15952
these two 15952

different? What are the practices of writing a safe program code?

15952 15952 15952 15952 15952 15952 15952 15952 15952

SECTION-D
7. What are the various approaches to Risk Management? Compare the two approaches to
15952 15952 15952 15952
Risk Prioritization. What is the 15952 15952
difference between Risk 15952
Management 15952
and Risk 15952

Assessment?

8. a) State the complete Information Security Life Cycle. Explain the relevance of each

m
15952 15952 15952 15952 15952 15952 15952 15952 15952
phase.

o
b) What is the need of having company-wide framework for BCM (Business Continuity

.r c
Management)?
15952 15952 15952 15952 15952 15952 15952 15952 15952

15952 15952 15952

pe
15952
SECTION-E
15952 15952

o m
15952 15952 15952

.r c
9. Write briefly :

p a
a. How are AES, DES and triple DES different on the basis of design and features? Also
describe

r e
15952 15952 15952 the operation
15952 of AES algorithm.
15952 15952 15952 15952 15952

15952 15952 c. In the b


15952RSA system, the public key
15952

a p
b. What requirements must a public key cryptosystem fulfill to be a secure algorithm?
15952of a given15952
user is e = 31,15952
n = 3599. What
15952 is the 15952

rp
private key of the user?
d. What is the major limitation of traditional substitution ciphers? How do the modern
15952 15952 block ciphers address
15952 15952 it?

b
15952 15952 15952 15952

e. What is the major limitation of the traditional one-time pad? How do the modern
stream ciphers address it?
15952

15952 15952 15952 15952 15952 15952 15952 15952 15952


f. Is AES a SYMMETRIC cipher? Why/why not?
g. You are sending confidential information to a colleague across the internet. How can
15952 15952 you15952
protect this 15952
message from15952
being read by individuals 15952
15952 other than the15952
intended 15952

recipient?

h. What is a Social Engineer?


15952 15952 15952 15952 15952 15952 15952 15952 15952
i. What are the potential threats posed by Denial of Service attacks?
j. What are the differences between a MAC and a digital signature? What are the
15952 15952 respective
15952 advantages
15952 of each? 15952 15952 15952 15952 15952

15952 2|M
15952 - 7 4 0 7 15952
4 15952 15952 15952 15952 ( S 6 15952
)-118E 15952

15952 15952 15952 15952 15952 15952 15952 15952 15952

S-ar putea să vă placă și