Documente Academic
Documente Profesional
Documente Cultură
Q2 Communication between a computer and a keyboard involves ______________ Attempt any FIVE (5) Questions.
transmission Each question is of SIX (6) marks.
A. Automatic B. Half-duplex
C. Full-duplex D. Simplex Q1 What do you meant by information security? explain.
Q2 What do you mean by MIM? Define the term viruses?
Q3 The attackers a network of compromised devices known as Q3 What do you mean by spoofs? Define sequence number spoofing?
A. Internet B. Botnet Q4 Define the HILL algorithms?
C. Telnet D. D-net Q5 What is crytography? Explain.
Q6 What are the principles of public key cryptosystems?
Q4 Firewalls are often configured to block Q7 What is brute force attacks? Explain.
A. UDP traffic B. TCP traffic
C. Both of the mentioned D. None of the mentioned SECTION C (LONG QUESTIONS)
Q6 A computer that handles resource sharing and network management in a Q1 What is kerberos? Explain kerbero’s limitations.
local area network. Q2 What are web traffic security approaches? Explain SSL record protocol ?
A. Network Server B. Virtual Private Network Q3 What is virtual private network? Explain IPsec tunnel Mode .
C. Network operating system D. OSI Q4 How many are types of firewall? Explain.What is Proxy Server ?
Q5 What is worm propagation model? Explain the concept of antivirus.
Q7 What is data encryption standard (DES)?
A. block cipher B. stream cipher
C. bit cipher D. none of the mentioned