Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
10 views1 page

June 2023

Previous Year question paper

Uploaded by

Sanket Hanchate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views1 page

June 2023

Previous Year question paper

Uploaded by

Sanket Hanchate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

A0

18
4

6
BC

F1
Paper / Subject Code: 32422 / Computer Network Security

1D
D0
5

1
F2

41
A0

6
BC
9A

1
0

F1

1D
D0
5

1
F2

41
FD

A0

6
BC
9A

F1
22

D0
5

1
F2

41
FD
Time: 3 hours Max. Marks: 80

B0

A0

BC
9A

0
22
AA
=====================================================================

D0
5

1
F2
FD
B0

A0
INSTRUCTIONS

BC
F4

9A

0
22
AA

D0
5
18
(1) Question 1 is compulsory.

1
F2
FD
B0

A0

BC
1D

F4

9A
(2) Attempt any three from the remaining questions.

22
AA

5
18
6

1
F2
FD
B0
F1
(3) Draw neat diagrams wherever necessary.

A0
1D

F4

9A
41

22
AA

5
18
6

F2
FD
0

B0
F1
Q1 5 marks each

1D
D0

F4

A
9A
41

22
AA

5
18
6
BC

F2
FD
0

B0
F1
a) Explain Security Services and mechanisms to implement it.

1D
D0

F4

9A
1

41

22
AA
A0

18
6
BC

FD
Compare HMAC and CMAC

0
b)

B0
F1

1D
D0
25

F4
1

41

22
AA
A0
AF

18
6
BC
c) Explain different NAC enforcement methods

B0
F1

1D
D0
25

F4

F
D9

41

22
AA
A0
d) Explain SSH protocol stack in brief
AF

18
6
BC
2F

B0
F1

1D
D0
25

F4
D9
2

41

AA
B0

A0
AF

18
6
BC
2F

F1
AA

1D
D0
25

F4
D9
2

10 marks each

1
Q2

41
B0

A0
AF

18
6
BC
F4

2F

F1
AA

1D
D0
25
D9
18

a) Explain Playfair cipher with example

41
B0

A0
AF

6
BC
1D

F4

2F

F1
AA

D0
25
b) Describe different Block Cipher modes
D9
18

2
16

41
B0

A0
AF

BC
1D

F4
1F

2F

0
Q3 10 marks each
AA

D0
25
D9
18
04

2
16

1
B0

A0
AF

BC
1D
D0

F4
1F

2F

a) State firewall design principles and its types with advantages.


AA

25
D9
18
04

2
16
BC

1
B0

A0
AF
1D
D0

F4
1F

2F

b) Describe different types of protocol offered by SSL.


01

AA

25
D9
18
04

2
16
BC
5A

B0

AF
1D
D0

F4
1F

2F
01
F2

AA

D9
18
04

2
16
BC
5A
9A

B0
1D
D0

F4
1F

2F

Q4 10 marks each
1
F2
FD

AA
A0

18
04

2
16
BC
A

B0
22

1D
D0
25

F4
1F
D9

a) What is Network access control? Discuss the elements present in this context.
1

AA
B0

A0
AF

8
04

6
BC
2F

D1
F1
AA

D0

b) Explain Kerberos Protocol in detail.


25

F4
D9
02

01

41

61
AF

18
BC
AB

2F

5A

00

F1

1D
D9
02

01

CD
F2
4A

41

16

Q5 10 marks each
AB

2F

5A
9A

00
8F

1B

1F
02

CD
F2
4A

FD
D1

A0

04

a) Explain the working of IPsec in its different mode.


AB

9A
8F

1B
22
61

D0
25
4A

FD
D1

B0

b) What is Network Management Security? Explain SNMP V3.


A0
AF

BC
8F

22
61

AA

25
D9

01
D1

B0
F1

AF
F4

2F

5A
41

61

AA

Q6 10 marks each
D9
18

02

F2
00

F1

1D

F4

AB

2F

9A
CD

41

a) Explain IDS and its types in detail.


18

02
16

4A

FD
00

1D

AB
1F

b) Define Malware. Explain at least five types with example.


CD

8F

22
04

16

4A
D1

B0
1B

D0

1F

____________________________
8F
61

AA
A0

04
BC

D1
F1
D0
25

F4
01

41

61
AF

18
BC
5A

00

F1

1D
01

CD
F2

41

16
5A
9A

00
1B

1F
CD
F2
FD

A0

04
9A

1B
22

25760 Page 1 of 1
D0
25
FD
B0

A0
AF

BC
22

25
D9

01
B0

AF

AAB022FD9AF25A01BCD0041F161D18F4
2F

5A

You might also like