Network Security Past Papers

[OBJECTIVE]

Subject: Network Security

Time Allowed: 15 Min

Total Marks: 10

NOTE: ATTEMPT THIS PAPER ON THIS QUESTION SHEET ONLY. Division of marks is given in front of each question. This Paper will be collected back after expiry of time limit mentioned above.

 

Part-I Encircle the correct option, each question carries equal marks. (10)

1. Message _________ means that the data must arrive at the receiver exactly as sent.
A. Confidentiality
B. Authentication
C. Integrity
D. None of Above
2. Message ___________ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
A. Confidentiality
B. Integrity
C. Authentication
D. None of Above
3. If ______ is needed, a cryptosystem must be applied over the scheme.
A. Integrity
B. Confidentiality
C. Nonrepudiation
D. Authentication
4. A digital signature needs a
A. Private-key system
B. Shared-key system
C. Public-key system
D. All of them
5. One way to preserve integrity of a document is through use of a
A. Eye-Rays
B. Finger Print
C. Biometric
D. X-Rays
6. Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attacker
B. The system configuration
C. The network architecture
D. The business strategy of the company
E. The level of access provided to employees
7. Which of the following pieces of information can be found in the IP header?
A. Source address of the IP packet
B. Destination address for the IP packet
C. Sequence number of the IP packet
D. Both (A) and (B) only.
8. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network. .
9. Encryption and decryption provide secrecy, or confidentiality, but not
A. Authentication
B. Integrity
C. Privacy
D. All of above
10. Digital signature provides _______.
A. Authentication
B. Both (A) and (B)
C. Nonrepudiation
D. None of it

[SUBJECTIVE]

Subject: Network Security

Time Allowed: 2 Hour 45 Min

Total Marks: 50

NOTE: ATTEMPT THIS (SUBJECTIVE) ON THE SEPARATE ANSWER SHEET PROVIDED

 

Part-II Give short answers, each question carries equal marks. (20)

Q#1: Describe the Block Cipher Principles and The Data Encryption Standard?

Q#2: Discuss the role of Ticket Granting Server (TGS) in inter realm operations of Kerberos?

Q#3: Explain the Advanced Encryption Standard, Evaluation Criteria For AES?

Q#4: Explain the viruses, Trojan horse and Worms?

Q#5: Discuss and explain The Strength of Des and Differential and Linear Cryptanalysis?

 

Part-III Give detailed answers, each question carries equal marks. (30)

Q#1: Explain the Firewall Design Principles, Firewall Characteristics, Types of Firewalls and Firewall deployment with diagrams?

Q#2: a) Describe the Key Management, Distribution of Public Keys and its following general schemes like Public announcement, Publicly available directory, Public-key authority, Public-key certificates?

b) Briefly explain RSA?

Q#3: Describe the Intruders, Intrusion Techniques and Intrusion Detection in detail?

500+ Past Papers – Computer Science