You are on page 1of 2

SASURIE ACADEMY OF ENGINEERING

NH-209, Sathy Main Road, Kariya!a"aya #$O%


Coi&ator'-()* (+,
DE$AR-MEN- OF E.EC-RONICS AND COMMUNICA-ION ENGINEERING
MODE. E/AMINA-ION
NE-0ORK SECURI-Y
C"a112S'34 I5 ECE-A 67 S''1t'r4 5III
Dat'4 2890,9*, -i'4 ,Ho:r1
Fa3:"ty In-Char;'4 79Go<1a"ya Ma=Mar>14 *00
$art ? A #*0 @ 2 A 20 Mar>1%
An1<'r a"" th' B:'1tion14
1. With a figure show how is authentication and confidentiality done in PGP.
2. What parameters define the session state of SSL?
3. What is proactive password checer?
!. What is "igital Signature?
#. What are the common techni$ues used to protect a password file?
%. What are the security options does PGP allow when sending an email message?
&. 'ow is a worm different from a virus? (nd state what a macro virus is?
). What is *ircuit level gateway?
+. What are the threats associated with a direct "igital Signature scheme?
1,. What is meant -y polymorphic viruses?

$art ? 7 #+@ *( A C0 Mar>1%
An1<'r a"" D:'1tion1
11. .a/. .i/ 01plain the processing of a message -loc of #12 -its using S'( 1. .12/
.ii/ Write a-out the symmetric encryption approach for digital signatures. .!/
23
.-/. 'ow does SSL provide We- Security in We- commence? 01plain in detail. .1%/
12. .a/. "iscuss a-out .i/ 4567 password management. .)/
.ii/ 8rusted system. .)/
23
.-/. "iscuss viruses and threats in detail. .1%/
13. .a/.What are the limitations of 9irewall? .i/ 6s firewall the ultimate solution? 'ow can this -e
craced? .)/
.ii/ 'ow is a firewall designed? .)/
23
.-/."iscuss -riefly a-out s:;6;0. .1%/
1!. .a/ .i/ 'ow do you provide 0lectronic ;ail Security?
.ii/ What are nown as cooies< honey pots and sniffer dogs? 6n which part of the networ
are they placed? .1%/
23
.-/. .i/ what are the functions included in ;6;0 in order to enhance security? 'ow are they
done? .)/
.ii/ Why does PGP maintain ey rings with every user? 01plain how the messages are
generated and received -y PGP? .)/
1#. .a/. .i/ "escri-e the familiar types of firewall configurations. .1,/ .)/
.ii/ Suggest any three password selection strategies and identify their advantages and
disadvantages if any. .%/
23
.-/. .i/ "efine intrusion detection and the different types of detection mechanisms in detail. .1,/
.ii/ Write short notes on 6P security. .%/