8. Internet Security
January-2004 [20]
1. Answer the following: (Attempt
any 7 parts)
a) What
do you think is the role of a network manager? [4]
e) Explain
briefly about the new technology that combines the advantages of both private
network and public network? [4]
5. Differentiate
between any 3 of the following pairs:
- Private key and Public Key. [6]
- Cookies and Passports [6]
July-2004 [34]
1.
a) Write
short note on Cookies. [4]
4. Explain
any three of the following:
i) How do Firewalls safeguard the
Internet? [6]
ii) How do Smurf Attacks cripple Internet
Service Providers? [6]
iii) How do Viruses work? [6]
iv) How do Digital certificates ensure Internet
Security? [6]
6. Write
short notes on any three of the following:
ii) Working of Proxy Servers [6]
January-2005 [36]
1. Answer
the following: (Attempt any 7 parts)
c) What
is a Proxy Server? Why it is used?
[4]
d) What
is a Firewall? At what layer do they work? What is the main drawback of a
firewall? [4]
e) Name
some packets that are used by SNMP for information transactions [4]
4.
a) Describe the concept of Virtual Private
Network (VPN). Why is security a concern when using VPN?
[6]
5.
c) Write
the difference between SNMP manager and SNMP agent
[6]
6.
a) Explain the difference between
authentication methods and encryption methods. Give examples of each as a part
of your explanation.
[6]
7.
b) Describe
how cookies can be used to store information about a user? [6]
July-2005 [20]
1.
e) What is a packet filter that is often
used to protect an organization’s computer from unwanted Internet traffic
called? Describe the concept in brief? [4]
g) What
is a malicious code? By which name are they popularly known. [4]
3. State the
difference between any three of the following in brief:
c) Digital
signature and digital certificate.
[6]
4. Expand and
explain in detail any three of the following acronyms:
a) VPN [6]
January-2006 [35]
1.
d) What
is a Proxy Server? What are its functions?
[4]
g) What
are digital certificates? Explain their role in Internet Security. [4]
2.
b) What
are Cookies? How are they different from Microsoft Passports? [6]
4.
a) What are Firewalls? How do they work? [4]
b) What are Viruses? What are the
different types of viruses? Explain, how viruses work on Internet? [8]
c) Write short notes on:
i) Smurf
Attacks [3]
7.
a) What
the different aspects of Network Security? What do you mean by Accountability
and Authorization?
[6]
July-2006 [24]
1.
g) What is the difference between plain
text and cipher text. Explain stream cipher. [4]
3.
c) Explain the differences between
authentication methods and encryption methods. Give examples of each. [6]
5.
a) Describe the concept of VPN. Why is
security a concern when using VPN? [6]
b) What is a firewall? What are the
typical tasks of a firewall? [6]
6.
a) Explain the following terms:
iv) Virus
scanning software [2]
January-2007 [24]
1.
f) What
is Wired Equivalent Privacy (WEP)? Discuss the Security Issues. [4]
2.
c) What
is a firewall? Explain with packet filtering concept. [6]
4.
c) What are the Internet security threats?
What are the factors that constitute a good firewall system? [6]
6.
b) Describe the risks involved in
Plaintext communication over the Internet? What can be done to ensure that
these dangers (risks) are dealt with. [8]
July-2007 [30]
1.
c) What
is the role played by VPN in the concept of network security? [4]
d) What
is firewall? Should it come before router or after router in a network?
Justify. [4]
g) What is IP address spoofing and how
could it be defeated? [4]
2.
4.
c) What is the difference between passive
and active attacks with respect to security threats faced in using the web?
[6]
7.
a) Describe in detail how public key and
private key cryptography are used to provide secure access from a browser to a
Web server over the Internet so that a commercial transaction can take place.
[6]
c) What are the various types of access
violations that may lead to the possible attacks, security breaches or
information corruption over an internet work? [6]
January-2008 [20]
1.
e) What
do you understand by IP spoofing?
[4]
g) What
does SNMP enable network managers do, and why is this important? [4]
3.
c) What is a firewall? What is the purpose
the packet filters and application gateways?
[6]
6.
b) What are Viruses? What are the
different types of viruses? Explain, how viruses work on the Internet? [6]
July-2008 [10]
1.
a) Differentiate between stream cipher and block cipher? [4]
3.
b) What
is the difference between monoalphabetic substitution cipher and polyalphabetic
substitution cipher? [6]
January-2009 [26]
1.
f) Compare
the role of a firewall with that of a proxy server. [4]
3.
c) Define
the term encryption and decryption. What are drawbacks of single key
encryption? Explain, how asymmetric key
encryption solves them. [6]
4.
c) Explain briefly cookie and its uses.
What information does a cookie contain? [6]
5.
a) What is
IPSec (IP Security Protocol Suite)? How is it similar to SSL? [6]
6.
b) What is VPN? What are its salient
features? [4]
July-2009 [28]
1.
e) What
is IP address spoofing and how could it be avoided? [4]
4.
a) Why authentication and encryption is
required in VPNs? Discuss any protocol of your choice that emphasizes
authentication and encryption in VPNs. [6]
5.
b) What are the various types of access
violations that may lead to the possible attacks, security breaches or
information corruption over an internet? [6]
7. Write
short notes on any three of the following:
a) Denial-of-Service
Attacks [6]
b) Digital
certificates [6]
January-2010 [35]
1. Write
short notes on
e) i)
Digital Certificates [2]
3.
b) What is the purpose of a Proxy Server?
Name different types of Proxy Servers? Explain functions of at least one Proxy
Server. [9]
4.
a) What
do you mean by Smurf Attack? How can this type of an attack be prevented? [6]
b) Discuss the different aspects of
Network Security. Explain Accountability and Authorization in the context of
Network Security? [6]
7.
a) What is Cryptography? State the
requirements of Public Key Cryptography. Discuss cryptoanalysis in detail. [9]
b) Write
short notes on
i) Firewall [3]
July-2010 [32]
1.
e) By
drawing suitable diagram explain VPN. What are its benefits? [4]
g) What are the types of virus? How does
virus infect the computer system? How viruses spread from one computer to
another computer? [4]
2.
b) What is Internet security? Explain a
protocol that defines architecture to provide various security services for traffic at the IP layer. [6]
6.
b) Describe how a message can be
authenticated using Public key encryption to ensure that the message was really
sent by a specific person or organization. [6]
7.
a) What is a digital certificate? What is
the most important authentication framework to make them effective? [6]
8. Write
short notes on (any three):
a) Firewall [6]
No comments:
Post a Comment