2 Marks:
1. Describe the role of public key distribution in cryptography?
2. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption
3. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography 3. Explain the terms with example: 1)
Piggy-backing 2) Shoulder Surfing 3) Dumper diving
4. Explain the working of the Caesar cipher with an example.
5. Describe the Rail Fence technique? Explain with an example.
6. Explain the Simple Columnar transposition technique work?
7. Write any 2 key differences between DES and AES encryption algorithms?
8. State the importance of key length in AES encryption?
9. Explain the significance of MD5 in cryptographic hash functions.
10. Define a hash function and mention two important features.
11. State the importance of Pretty Good Privacy (PGP) protocol in enhancing email security?
12. State the need for a demilitarized zone (DMZ) in network security?
13. Describe Honeypot?
14. State any 4 points of email security techniques.
15. Define: 1) Hacking 2) Digital forgery 3) Cyber Stalking/Harassment 4) Cyber pornography 5) IDS
4 Marks:
1.
Describe the Playfair cipher technique? Encrypt the word "VPMS" using a Playfair cipher with “MONARCHY”
sample key.
2. Describe the Simple Columnar transposition technique and encrypt the word "SECURITY" using key 4.
3. Explain the Diffie-Hellman key exchange algorithm and how a man-in-the-middle attack can affect it.
4. Describe digital signature? Explain its working with diagram.
5. Explain stepwise procedure of AES/DES/RSA
6. Describe threats to mobile phone. Explain in detail process to prevent them.
7. Compare MD5 with SHA.
8. Define Crime against individual, Government, Property.
9. With the help of diagram explain host-based and network-based IDSs.
10. Compare host -based and network based IDSs. (Any 4 points).
11. Describe SMTP in e-mail security.
12. How does an Intrusion Detection System (IDS) work? Compare honeypots with IDS.
13. Define OS fingerprinting? How do attackers use it in cyberattacks?
14. if p = 13, q = 5 are the given prime numbers and public key is e = 7, find the value of private key d and plain
text of cipher value 6.
15. Describe the working principle of firewall.