Sie sind auf Seite 1von 4

1

Code: R7411206 IV B.Tech I Semester (R07) Regular & Supplementary Examinations, November/December 2011 INFORMATION SECURITY (Common to Information Technology & Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE questions All questions carry equal marks ***** 1 (a) Describe the various security services. (b) Explain TCP session hijacking. 2 Explain the following: a) SHA-512 b) HMAC.

3 (a) Explain RSA public key encryption algorithm with example. (b) Describe the x.509 version 3 in detail. 4 (a) How does PGP provides public-key management? (b) Explain S/MIME functionality. 5 (a) Explain the applications and benefits of IPSec. (b) Explain ESP protocol in detail? 6 (a) Discuss in detail the messages exchanged between client and server during the phases of handshake protocol of SSL. (b) Explain how SSL record protocol provides basic security services to various higher layer protocols. 7 (a) With a neat diagram explain SNMP U 3 message format with USM. (b) Discuss in detail the advanced antivirus techniques. 8 What are the different types of firewalls? Explain each type with neat diagrams. *****

2
Code: R7411206 IV B.Tech I Semester (R07) Regular & Supplementary Examinations, November/December 2011 INFORMATION SECURITY (Common to Information Technology & Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE questions All questions carry equal marks ***** 1 (a) Define a security attack. Explain various types of attacks. (b) Explain UDP hijacking. 2 (a) Explain various cipher block modes of operation. (b) Explain HMAC. 3 (a) Illustrate Diffie-hellman key exchange scheme with example. (b) Explain principles and requirements of public-key cryptography. 4 (a) Describe the five principal services that PGP provides. (b) Explain the general format of a PGP message with a diagram. 5 (a) Explain IPSec architecture. (b) Explain IPSec authentication header protocol in detail. 6 What protocols comprise SSL? Explain each.

7 (a) Describe SNMP architecture. (b) Discuss in detail four generations of antivirus software. 8 Write short note on the following: a) Statistical Anomaly Detection. b) Rule-Based Intrusion Detection. *****

3
Code: R7411206 IV B.Tech I Semester (R07) Regular & Supplementary Examinations, November/December 2011 INFORMATION SECURITY (Common to Information Technology & Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE questions All questions carry equal marks ***** 1 Write a) b) c) short note on the following: Security attacks Security services. Security mechanisms.

Explain the following: a) SHA-512. b) Key distribution.

3 (a) Explain RSA public key encryption algorithm with example. (b) Explain the following: i) Digital signatures. ii) Digital certificates. 4 Explain the following related to S/MIME messages. a) Enveloped Data. b) Singed Data. c) Clear Signing. d) Registration Request. e) Certificate-only Messages.

5 (a) Explain SA parameters and SA selectors in IPSec. (b) Explain ESP protocol in detail. 6 (a) Describe the architecture of SSL. (b) What is SSL session? What are the parameters that define a session state? (c) What area the parameters that define a connection state? 7 (a) Explain SNMPU1 community facility. (b) What are the typical phases of operation of a virus? 8 What are the different types of firewall? Explain each type with neat diagrams. *****

4
Code: R7411206 IV B.Tech I Semester (R07) Regular & Supplementary Examinations, November/December 2011 INFORMATION SECURITY (Common to Information Technology & Computer Science & Systems Engineering) Time: 3 hours Max Marks: 80 Answer any FIVE questions All questions carry equal marks ***** 1 (a) Define a security attack. Explain various types of attacks. (b) Explain the model for internet work security. 2 (a) Explain AES in detail. (b) Write about key distribution. 3 Explain Kerberos version 4 in detail.

4 (a) Explain PGP message generation and message reception. (b) Explain S/MIME certificate processing. 5 (a) Explain the applications and benefits of IPSec. (b) Explain authentication header protocol of IPSec. 6 (a) Explain the sequence of events that are required for a secure electronic transaction. (b) Explain the concept of dual signature. 7 (a) Draw the block diagram of traditional SNMP agent and explain its role. (b) Discuss about the four generations of the antivirus software. 8 Explain trusted systems in detail. *****

Das könnte Ihnen auch gefallen