Course: 05, 12
Code: 5019
Time: 2.30 Hrs. M.M.: 75
Section 'A'
Note: Attempt any 10 questions. 10 x 1 = 10
1. If a computer system is not accessible, the principle of …… is violated.
(a) Confidentiality (b) Authentication
(c) Integrity (d) Access Control
2. Virus is a computer___________
(a) File (b)Program
(c) Database (d) Network
3. A worm…………………… modify a program.
(a) does not (b) does
(c) may not (d) may
4. DES encrypts blocks of___________ bits.
(a) 32 (b) 56
(c) 64 (d) 128
5. A private key……………
(a) must be distributed (b) Must be shared
(c) Most are remaining secret (d)1 All of these
6. RSA_______ be used for digital signature.
(a) must not (b) cannot
(c) can (d) should not
7. Confidentiality specify that________
8. Authentication is………………
9. Integrity is …………………
10. Non-Repudiation is……………
11. Access control is ………………
12. Availability states that…………
Section 'B'
Note: Attempt any 5 questions. 5 x 6 = 30
13. Why are some attacks called PASSIVE? Why do other attacks call ACTIVE?
14. What is the concept of Phishing & Pharming?
15. What is Plain Text and Cipher Text?
16. What is the concept of Caesar Cipher?
17. Distinguish between. Symmetric & Asymmetric key interim of cryptography.
18. What is a Firewall? What is the limitation of a firewall?
19. What is a VPN?
Section 'C'
Note: Attempt any 5 questions. 5 x 7 = 35
20. What is cryptography & network security?
21. What are IDS? What is the limitation of the intrusion detection system?
22. What is Encryption & Decryption? Draw a block diagram showing Plain Text, Cipher Text, Encryption, and Decryption.
23. What is a Worm? What is a significant difference between worm & virus?
24. Write a short note on
(i) PPTP/LLPT
(ii) PGP
25. Explain the DBS and RSA Algorithm.
26. Explain the IT Act 2000 in detail.