Cns Pyqs Merge
Cns Pyqs Merge
Examination Scheme
Theory
Computer Network
ITC502 20 20 20 80 03 -- -- 100
Security
Course Objectives:
Sr. No. Course Objectives
Course Outcomes:
Cognitive levels of
Sr. attainment as per
No. Course Outcomes Bloom’s Taxonomy
On successful completion, of course, learner/student will be able to:
1 Explain the fundamentals concepts of computer security and network L1, L2
security.
2 Identify the basic cryptographic techniques using classical and block L1
encryption methods.
3 Study and describe the system security malicious software. L1, L2
4 Describe the Network layer security, Transport layer security and L1, L2
application layer security.
5 Explain the need of network management security and illustrate the need L1, L2
for NAC.
6 Identify the function of an IDS and firewall for the system security. L1,L2, L3
Prerequisite: Basic concepts of Computer Networks & Network Design, Operating System
DETAILED SYLLABUS:
Sr. CO
Module Detailed Content Hours
No. Mapping
Basic concepts of Computer Networks & Network Design,
0 Prerequisite 02 --
Operating System
Computer security and Network Security(Definition), CIA,
Services, Mechanisms and attacks, The OSI security
architecture, Network security model. Classical Encryption
techniques (mono-alphabetic and poly-alphabetic
Introduction
substitution techniques: Vigenere cipher, playfair cipher,
to Network
I transposition techniques: keyed and keyless transposition 07 CO1
Security &
cryptography ciphers). Introduction to steganography.
Textbooks:
1 William Stallings, Cryptography and Network Security, Principles and Practice, 6th Edition,
Pearson Education, March 2013.
2 Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill.
3 Mark Stamp’s Information Security Principles and Practice, Wiley
4 Bernard Menezes, “Cryptography & Network Security”, Cengage Learning.
References:
1 Applied Cryptography, Protocols, Algorithms and Source Code in C, Bruce Schneier, Wiley.
2 Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.
3 www.rsa.com
Online References:
Assessment:
Internal Assessment (IA) for 20 marks:
IA will consist of Two Compulsory Internal Assessment Tests. Approximately 40% to
50% of syllabus content must be covered in First IA Test and remaining 40% to 50% of
syllabus content must be covered in Second IA Test
Question Paper will comprise of a total of six questions each carrying 20 marksQ.1
will be compulsory and should cover maximum contents of the syllabus
Remaining questions will be mixed in nature (part (a) and part (b) of each question
must be from different modules. For example, if Q.2 has part (a) from Module 3 then
part (b) must be from any other Module randomly selected from all the modules)
61
5F
A0
BC
0
Paper / Subject Code: 32422 / Computer Network Security
F1
68
D0
5
1
F2
41
61
A0
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System )
BC
5
9A
F1
68
D0
5
(R- 19) (C Scheme) / 32422 - Computer Network Security QP CODE: 10025760 DATE: 25/05/2023
1
F2
41
FD
61
A0
BC
9A
F1
22
D0
5
1
Time: 3 hours Max. Marks: 80
F2
41
FD
B0
A0
BC
9A
0
=====================================================================
22
AA
D0
5
1
F2
FD
B0
A0
INSTRUCTIONS
BC
F6
9A
0
22
AA
D0
5
(1) Question 1 is compulsory.
85
1
F2
FD
B0
A0
BC
16
F6
(2) Attempt any three from the remaining questions.
9A
22
AA
5
6
85
1
F2
F1
(3) Draw neat diagrams wherever necessary.
FD
B0
A0
16
F6
9A
41
22
AA
5
6
85
F2
00
F1
FD
B0
Q1 5 marks each
16
F6
A
CD
9A
41
22
AA
5
6
85
F2
00
F1
FD
B
B0
a) Explain Security Services and mechanisms to implement it.
16
F6
01
CD
9A
41
22
AA
6
85
5A
Compare HMAC and CMAC
00
b)
F1
FD
B
B0
16
F6
01
CD
F2
41
22
AA
6
Explain different NAC enforcement methods
85
c)
5A
9A
00
F1
B
B0
16
F6
F
01
CD
F2
41
FD
22
AA
d) Explain SSH protocol stack in brief
85
5A
9A
00
F1
B
B0
22
16
F6
01
CD
F2
41
FD
B0
AA
6
85
5A
9A
00
F1
B
22
AA
16
F6
10 marks each
01
Q2
CD
F2
41
FD
B0
85
F6
5A
9A
00
F1
B
22
AA
16
85
01
CD
F2
41
FD
B0
6
16
F6
5A
9A
00
F1
B
22
AA
85
01
CD
F2
41
FD
B0
1F
16
F6
5A
9A
00
B
Q3 10 marks each
22
AA
04
16
85
01
CD
F2
FD
B0
D0
1F
16
F6
5A
9A
a) State firewall design principles and its types with advantages.
B
22
AA
04
16
BC
85
01
F2
FD
0
D0
1F
16
F6
AB
5A
01
16
BC
85
5A
F2
6A
FD
B0
D0
1F
16
01
9A
2
5F
22
AA
AF
04
16
BC
5A
FD
68
0
D0
1F
D9
F6
AB
01
2
Q4 10 marks each
61
22
AF
04
BC
85
2F
5A
6A
F1
B0
D0
D9
16
02
01
F2
a) What is Network access control? Discuss the elements present in this context.
41
5F
AA
16
BC
B
5A
9A
8
22
AA
D0
1F
16
AF
04
16
BC
85
5A
22
AA
D0
1F
D9
16
01
2
B0
AF
04
16
BC
F6
2F
5A
Q5 10 marks each
AA
D0
1F
D9
85
02
01
2
AF
04
BC
16
F6
AB
5A
a)
D0
16
D9
85
02
01
F2
6A
AB
2F
5A
9A
5F
16
02
01
F2
6A
FD
68
1F
AB
5A
9A
61
5F
22
04
Q6 10 marks each
F2
6A
F1
FD
68
B0
D0
9A
41
61
5F
22
AA
a)
00
F1
FD
68
B0
F6
CD
41
61
22
F1
1B
B0
16
F6
CD
____________________________
41
A0
AA
16
85
00
1B
25
1F
16
F6
CD
A0
AF
04
16
85
1B
D0
25
1F
16
A0
AF
04
16
BC
D0
25
1F
D9
01
AF
04
BC
2F
5A
D0
D9
02
25760 Page 1 of 1
01
F2
BC
AB
2F
5A
9A
02
01
F2
FD
AB
5A
9A
AAB022FD9AF25A01BCD0041F161685F6
22
52
2
BC
00
68
1F
Paper / Subject Code: 32422 / Computer Network Security
00
20
2B
57
CD
33
05
00
68
1F
91
1T01235 - T.E.(Information Technology Engineering)(SEM-V)(Choice Base Credit Grading System ) (R- 19) (C Scheme) /
7B
30
20
2B
CD
7D
32422 - Computer Network Security QP CODE: 10037164 DATE: 24/11/2023
05
13
1F
2D
B
00
9
D
D
52
Time (3 Hours) [Total Marks 80]
7F
05
3
C
7
1
2D
00
B
0
05
D9
7
33
52
0C
7F
05
N. B:
C
7
1
D
7B
00
05
68
D9
1. Question No. 1 is Compulsory.
0
2
52
C
2B
7F
05
3
2. Solve any THREE from Question No. 2 to 6.
D7
0
91
00
00
5
8
1F
0
3. Draw neat well labelled diagram wherever necessary
F2
7D
52
0C
2B
CD
13
57
00
68
1F
9
7B
7D
Q. 1 a) Describe RC5 algorithm with an example. (5)
33
C
B
F
CD
5
05
7
0
2
1
2D
00
b) Explain the purpose of keylogger and rootkit. (5)
5
8
1F
9
B
00
C0
6
7D
3
2B
7F
7
c) Explain Playfair Cipher with an example. (5)
3
52
05
80
91
C
2D
05
1F
d) Explain how VPN can be used to encrypt your personal data. (5)
00
B
0
B6
7D
0
7F
7
D
33
52
0
2
BC
2D
0
05
8
F
91
B6
1
Q2. a) Explain Public Key Cryptography and RSA algorithm. Given modulus n=91 and
0
0C
7F
57
CD
7D
52
7
2
3
2D
public key e=5, find the value of p, q, phi(n) and d using RSA. Encrypt M=25. (10)
5
68
1F
1
2D
B
00
C0
9
7F
57
b) List and explain all types of Malware in detail. Differentiate between Virus and
CD
D
52
7F
80
F2
13
7
05
Worms. (10)
D
00
7B
0
05
B6
D1
9
0C
2
7D
33
2
0C
7F
05
F2
C
5
68
91
2D
B
00
5
68
D1
Q3. a). Explain Kerberos protocol in detail. Show how a Kerberos protocol can be used to
0
0
2B
7
7D
52
0C
2B
7F
5
3
BC
achieve single sign-on in distributed systems. (10)
1F
91
2D
00
00
05
68
1F
b) Explain the OSI Security Architecture and Network Security Model. (10)
57
CD
7D
33
52
C
2B
7F
CD
00
0
91
D
7B
5
8
1F
0
7B
20
0
6
3
0C
2B
05
CD
Q4. a) Explain Email security process. Explain how S/MIME can be used for Digital
3
D7
05
05
00
5
68
1F
30
7B
00
F2
52
0C
2B
D
3
52
D7
b) Explain the implementation of Network Access Control with one use case. (10)
05
91
BC
00
05
68
1F
00
00
F2
7D
33
C
2B
57
D
33
52
57
0
91
C
2D
Q5. a) Explain how Network Management security is implemented using SNMP v3. (10)
00
8
F
91
00
C0
B6
D1
7D
20
7F
57
33
80
F2
BC
D7
05
2D
0
5
91
C0
6
D1
30
0
F2
7F
57
7D
80
F2
BC
5
00
57
05
2D
00
B6
D1
D9
0C
7
3
2
F
05
F2
13
C
7
68
2D
B
0
1
D9
20
C0
2B
7
5
7
0
57
80
1F
91
7B
0
0
20
C0
B6
CD
D
5
3
7
05
00
57
80
2
1
2D
7B
f) SSL Architecture
1F
20
C0
B6
33
F
05
CD
05
57
80
2
1
D
00
1F
D9
30
C0
B6
F2
52
D
*****************
13
D7
57
80
2
BC
00
1F
D9
C0
B6
F2
33
57
D7
57
80
2
91
BC
0
1F
00
C0
B6
F2
7D
57
D
52
57
80
2
BC
2D
0
1F
00
C0
B6
7F
57
D
2
80
F2
BC
05
05
00
B6
1
30
0C
57
D
2
F2
13
BC
05
68
00
1
D9
30
2B
57
CD
2
13
D7
05
1F
7B
00
D9
30
CD
2
05
13
D7
05
7B
00
D9
30
2
2
7F
05
13
37164 Page 1 of 1
D7
5
00
00
05
D9
2
52
0C
7F
13
D7
00
05
D9
F2
33
0C
D7
0C057F2D7D9133005200057BCD1F2B68
57
91
6
52
52
7
Y1
7
E1
Paper / Subject Code: 32422 / Computer Network Security
E1
DX
DX
25
16
6
7
Y1
7
June 5, 2024 02:30 pm - 05:30 pm 1T01235 - T.E.(Information Technology
5
5Y
E1
E1
DX
DX
Engineering)(SEM-V)(Choice Base Credit Grading System ) (R- 19) (C Scheme) / 32422 -
25
16
6
52
Y1
7
5
Computer Network Security QP CODE: 10055609
5Y
E1
DX
E1
DX
25
16
6
52
17
Y1
5
5Y
E1
DX
DX
6E
Time: 3 Hours Max. Marks: 80
25
16
52
Y1
17
5
5Y
E1
Y
DX
DX
6E
25
25
16
INSTRUCTIONS
52
Y1
17
X5
5
5Y
E1
DX
DX
(1) Question 1 is compulsory.
6E
25
7D
16
52
Y1
17
(2) Attempt any three from the remaining questions.
X5
7
E1
5Y
E1
DX
6E
25
7D
(3) Draw neat diagrams wherever necessary.
16
16
52
Y1
17
X5
5Y
E1
5Y
E1
DX
6E
25
7D
16
52
16
52
Y1
17
X5
5Y
E1
DX
5Y
DX
6E
25
7D
Q1 5 marks each
16
52
52
7
Y1
17
X5
E1
5Y
E1
DX
DX
a) Distinguish between passive and active security attacks
6E
25
7D
16
16
52
7
Y1
Differentiate between virus and worm
17
b)
X5
5Y
E1
5Y
E1
DX
DX
6E
25
Explain SSH protocol stack in brief
7D
c)
16
16
52
52
7
Y1
17
X5
5Y
E1
5Y
DX
E1
d) Write short note on :Email Security
DX
6E
25
7D
16
16
52
52
7
Y1
X5
E1
5Y
E1
5Y
DX
E1
DX
Q2 10 marks each
25
7D
16
16
16
52
52
7
X5
5Y
E1
5Y
E1
5Y
DX
E1
DX
7D
16
16
52
16
52
52
b)
7
7
5Y
E1
5Y
DX
E1
5Y
DX
E1
DX
Q3 10 marks each
16
16
52
16
52
52
7
7
E1
E1
5Y
DX
E1
5Y
DX
DX
16
16
16
52
b) Given modulus n=221 and public key e=7 find the values of p,q,phi(n) and d using
52
52
7
7
5Y
E1
5Y
E1
5Y
DX
E1
DX
DX
RSA encrypt M=5
16
16
52
16
52
52
7
17
7
5Y
E1
5Y
DX
5Y
DX
E1
DX
6E
16
52
16
52
52
Q4 10 marks each
17
Y1
17
5Y
E1
DX
5Y
DX
DX
6E
6E
25
52
7
Y1
17
X5
E1
5Y
E1
DX
6E
25
7D
16
16
52
Q5 10 marks each
17
Y1
17
X5
5Y
5Y
E1
DX
6E
6E
a) Show how a Kerberos protocol can be used to achieve single sign on in distributed
25
7D
16
52
52
Y1
17
Y1
X5
systems
5Y
DX
E1
DX
6E
25
25
7D
17
X5
X5
5Y
E1
DX
Q6 10 marks each
6E
25
7D
7D
16
52
Y1
17
a)
1
5Y
E1
DX
6E
6E
25
7D
Y1
17
X5
E1
25
7D
16
52
Y1
17
X5
5Y
E1
DX
6E
25
7D
16
52
Y1
17
X5
5Y
E1
X
_______________
6E
25
7D
7D
16
52
Y1
X5
E1
5Y
E1
DX
25
7D
16
16
52
17
X5
5Y
E1
DX
6E
7D
16
52
Y1
17
5Y
E1
DX
6E
25
16
52
1
17
X5
5Y
5Y
X
6E
55609 Page 1 of 1
7D
7D
52
52
1
5Y
E1
DX
DX
16
52
X525Y16E17DX525Y16E17DX525Y16E17DX525Y16E17D
17
17
yz{|}~~|~|~~~{|}~|}~|}
13/11/2024 IT SEM-V C SCHEME CNS QP CODE: 10064504
9 774
!"#$
%9&'()*
+,9(7&)99997&&8-9&*
.7/&970787/9919&9'97)*
%
23 4567898:;<=79>?@268AB78;<889C:7=87?57D7;25;: 3
E3 F@GH2=:25I;@59=289B4J25IK4JA3
;3 4LH62759C:H<=H@8:@DM:>6@??:=25I=@@9M79 3
I3 JNKH=@O7I:8E:99:=8:;<=79>9C25PBQR<897D> 3
%+
23 STUVWXYZ[\]^_Z^_ZY]`Za^TbcZ̀dbefZg^Y]ZhcbWZab^VZU^X]`ViY]`Zj`WZ^_Zklm^nbTU`o 4
E3 pC29789C:87?57D7;25;:@D2I7?792687?529<=:@52;:=97D7;29:qR<897D> 4
%
23 N@rI@:8stJ:;C:6H9@2;C7:O:2<9C:597;297@525I;@5D7I:5972679>qR<897D>9C:5::I@D
KN25I4Jt u4
E3 pC29s8tvsA4LH6275tvs2=;C79:;9<=:75I:9276 u4
%2
23 JC@rC@r2v:=E:=@8H=@9@;@6;25E:<8:I9@2;C7:O:875?6:87?5@575I789=7E<9:I
8>89:G8 4
E3 pC29785:9r@=M2;;:88;@59=@6qB78;<889C::6:G:598H=:8:59759C78;@59:L9 4
%3
23 4LH6275I7DD:=:599>H:8@DI:5726@D8:=O7;:2992;M8 4
E3 4LH62755:9r@=MG252?:G:598:;<=79>r79C=:8H:;99@JwPtH=@9@;@6 4
%1
23 4LH6275I7DD:=:59G:9C@I8@DsBJqJ929:;2H2E76797:825I;C266:5?:875sBJ 4
E3 4LH62759=258H@8797@5;7HC:=8r79C766<89=297O::L2GH6:8 4
xxxxxxxxxxxxxxxxx
12342 6789