Sunteți pe pagina 1din 1

Directorate of Distance Education

INTEGRAL UNIVERSITY, LUCKNOW Q8 What is the virus that spread in computer?


Semester Examination: June 2018 A. It is hardware B. It is system software
BASIC NETWORK DESIGNING & SECURITY C. It is a computer program. D. It is a windows tool
(PAPER CODE: BCA 403)
Q9 What is the name of first computer virus?
Course: BCA Semester: 4th A. The Famous B. HARLIE
Duration: 3 Hours Total Marks: 80 C. PARAM D. Creeper
SECTION A
 Attempt all Ten (10) Questions. Q 10 Digital signature provides ________.
 Each question is of TWO (2) marks. A. authentication B. nonrepudiation
C. both (a) and (b) D. Neither (a) nor (b)
Q1 The structure or format of data is called
A. Syntax B. Semantics SECTION B (SHORT-QUESTIONS)
C. Struct D. None of the mentioned

Q2 Communication between a computer and a keyboard involves ______________  Attempt any FIVE (5) Questions.
transmission  Each question is of SIX (6) marks.
A. Automatic B. Half-duplex
C. Full-duplex D. Simplex Q1 What do you meant by information security? explain.
Q2 What do you mean by MIM? Define the term viruses?
Q3 The attackers a network of compromised devices known as Q3 What do you mean by spoofs? Define sequence number spoofing?
A. Internet B. Botnet Q4 Define the HILL algorithms?
C. Telnet D. D-net Q5 What is crytography? Explain.
Q6 What are the principles of public key cryptosystems?
Q4 Firewalls are often configured to block Q7 What is brute force attacks? Explain.
A. UDP traffic B. TCP traffic
C. Both of the mentioned D. None of the mentioned SECTION C (LONG QUESTIONS)

Q5 What protocol is NOT used in the operation of a VPN?


 Attempt any THREE (3) Questions.
A. PPTP B. IPsec
 Each question is of TEN (10) marks.
C. YMUM D. L2TP

Q6 A computer that handles resource sharing and network management in a Q1 What is kerberos? Explain kerbero’s limitations.
local area network. Q2 What are web traffic security approaches? Explain SSL record protocol ?
A. Network Server B. Virtual Private Network Q3 What is virtual private network? Explain IPsec tunnel Mode .
C. Network operating system D. OSI Q4 How many are types of firewall? Explain.What is Proxy Server ?
Q5 What is worm propagation model? Explain the concept of antivirus.
Q7 What is data encryption standard (DES)?
A. block cipher B. stream cipher
C. bit cipher D. none of the mentioned

S-ar putea să vă placă și