Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views1 page

Dec 2023

Previous year paper for CNS

Uploaded by

Sanket Hanchate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views1 page

Dec 2023

Previous year paper for CNS

Uploaded by

Sanket Hanchate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

2

E
BC
05

00
Paper / Subject Code: 32422 / Computer Network Security

16

57
30

20

57

CD

E3
13

05

00

16

57
7B
D9

30

20

CD

E3
05
3
D7

16
1

00

B
00
9
F2

CD
D

3
Time (3 Hours) [Total Marks 80]

52

05
3
7
57

91
D

00

7B
0 0
C0

F2

33

52
N. B:

05

C
7
7
70

1
D

B
00
5
1. Question No. 1 is Compulsory.

D9

0
0
35

F2

7
3

52
C

5
2. Solve any THREE from Question No. 2 to 6.

3
7
6E

00
57
0

91
2D

00
7
3. Draw neat well labelled diagram wherever necessary

0
C0
D1

7D

52
E3

13
7
0
BC

0
5
16

0
0
35

F2
Q. 1 a) Describe RC5 algorithm with an example. (5)

7D

3
57

C
D

5
E

57
0
C

1
b) Explain the purpose of keylogger and rootkit. (5)

2D
00

00
6

D9
B

C0
D1

35
20

33
7
c) Explain Playfair Cipher with an example. (5)

7F

D7
5

6E

0
C
05

91
00

05
57
d) Explain how VPN can be used to encrypt your personal data. (5)

2
30

7D
0

57

C
CD

7F
2

0
13

2D
0

05
6

7
0

B
0

D1

5
D9

Q2. a) Explain Public Key Cryptography and RSA algorithm. Given modulus n=91 and
0

57

0C
3

7F
3

7
E
3

C
D7

5
public key e=5, find the value of p, q, phi(n) and d using RSA. Encrypt M=25. (10)

2D
00

5
16

57
1

7B

C0
9

20
F2

b) List and explain all types of Malware in detail. Differentiate between Virus and

7F
D

6E

70
3

BC
7

05

0
57

05
Worms. (10)
91
D

D1

35
0

0
C0

F2

57

0C
D

33

52

6E
C
7

00
7
70

57
91
D

B
5

D1
Q3. a). Explain Kerberos protocol in detail. Show how a Kerberos protocol can be used to
30

20
C0
5

F2

E3
D
E3

5
3

BC
D7

05
achieve single sign-on in distributed systems. (10)

0
57
70

16
1

00
16

D9

30
0
5

b) Explain the OSI Security Architecture and Network Security Model. (10)

57

CD
2
C
CD

E3

13
7

05

00
57
0

7B
16

9
7B

30

20
0
35

F2

D
C
CD

05
Q4. a) Explain Email security process. Explain how S/MIME can be used for Digital
13
D7
05

05
E

57
0

00
6

Signature and verification operations on email messages. 9 (10)


7B
00

30
C0
D1

F2

7D

52
3
52

3
05

b) Explain the implementation of Network Access Control with one use case. (10)
6E

57
70
BC

91
2D

00
00

00

0
1

35

7D

33
57

C
D

7F
33

52

6E

0
BC

91
2D
00

Q5. a) Explain how Network Management security is implemented using SNMP v3. (10)
05
7
91

00

D1

35

7D
20

57

7F
7D

b) What is an Intruder Detection System? Explain its types in detail. (10)


33

6E

70
C
05

2D
00

05
91
2D

35
30

20

0C
CD

7F
7D
7F

E
13

Q6. Write Short Notes on ANY 4: (20)


05

05
6

57
2D

7B
0
05

1
D9

30

a) Firewall design principles


0

0C
CD

E3
2
C

7F

5
3
D7

00
70

b) Block Cipher Modes of Operation


16

57
91

00

7B
5

20
C0

CD

E3
7D

c) HMAC and CMAC


33
7F

5
05

0
70

16
91
D

d) Steganography and its applications


7B
0
5

30

0
C0
35

F2

CD
7D

52

e) SHA 256 and SHA 512


05
13
E

57
70

7B
00
16

f) SSL Architecture
9

0
C0
35

F2

52
D

05
13
D7
E

57
70
BC

00
16

30
C0
35

F2

7D

52
D

13

*****************
E

7
70
BC

00
5
16

9
C0
35

7D

33
57

7F
E

70
BC

91
2D
0

05
16
00

35

7D
7

C
D

7F
2

05

70
BC
05

2D
05
16
0

35
20

0C
D

7F
05

E
BC
5

05
16

7
00

5
20

57

0C
D

E3
3
13

BC
5

16

57
00

00
D9

57

CD

E3
3

2
13
D7

05

16
7B
00
D9

30

CD
2

5
13
D7

05

7B
00
D9

30
2

2
7F

05
13
D7

05

37164 Page 1 of 1
00
05

D9

30
2

52
0C

7F

13
D7

00
05

9
2

7D

33
0C

7F

0C057F2D7D9133005200057BCD16E357
91
2D
05

You might also like