SPPU Computer Engineering (Semester 7)
Cyber Security
December 2016
Total marks: --
Total time: --
INSTRUCTIONS
(1) Assume appropriate data and state your reasons
(2) Marks are given to the right of every question
(3) Draw neat diagrams wherever necessary


Solve any one question Q.1(a, b) and Q.2(a, b)
1(a) What are the categories of computer security.
5 M
1(b) Illustrate the cryptanalysis with Dictionary attack.
5 M

2(a) Explain various active attacks in detail.
5 M
2(b) What is transposition cipher? Encrypt plain text " WE ARE THE BEST" using transposition cipher use key - " HEAVEN"
5 M

Solve any one question Q.3(a, b) and Q.4(a, b)
3(a) Explain fesitel cipher in detail.
5 M
3(b) Describe elliptic curve cryptography.
5 M

4(a) Compare between symmetric key encryption and asymmetric key encryption.
5 M
4(b) Explain digital signature algorithm.
5 M

Solve any one question Q.5(a, b) and Q.6(a, b,c)
5(a) Explain working of PGP in detail.
9 M
5(b) Describe IPsec protocol with its components & security services.
8 M

6(a) Explain ISAKMP protocol for IP sec.
6 M
6(b) What is VPN? Explain types of VPN.
6 M
6(c) Expalin secure socket layer handshake protocol in brief.
5 M

Solve any one question Q.7(a, b,c) and Q.8(a, b,c)
7(a) Explain types of Intrusion detection systems (IDS).
6 M
7(b) List and explain any two password management practices.
6 M
7(c) What are the various characteristics of firewall?
5 M

8(a) Describe types of firewall in detail.
6 M
8(b) Explain methods for intrusion detection system(IDS)
6 M
8(c) What is Access control security service?
5 M

Solve any one question Q.9(a, b,c) and Q.10(a, b,c)
9(a) How VoIP hacking is done by attackers? What are the counter measures for it?
7 M
9(b) Identifying wireless network defenses & counter measures.
7 M
9(c) What is hacking? Explain mobile hacking.
2 M

10(a) How various wireless devices targeted by hackers in hacking the wireless network?
7 M
10(b) Explain operation of various hacking devices.
7 M
10(c) What is input validation Attack?
2 M



More question papers from Cyber Security
SPONSORED ADVERTISEMENTS