Nis Pyq 22620

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

12223

22620
3 Hours / 70 Marks Seat No.

Instructions : (1) All Questions are compulsory.


(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.

Marks

1. Attempt any FIVE of the following : 10

(a) Define computer security and state it’s need.

(b) Explain shoulder surfing attack.

(c) Explain the term cryptography.

(d) State the meaning of hacking.

(e) Describe sniffing attack.

(f) Explain need for firewall.

(g) Explain use of PCI DSS.

2. Attempt any THREE of the following : 12

(a) Define Risk. Describe qualitative and quantitative risk analysis.

(b) Explain working of biometric access control with any type of example.

(c) Explain Ceaser’s Cipher substitution technique with suitable example.

(d) Describe DES algorithm with suitable example.

[1 of 2] P.T.O.
22620 [2 of 2]
3. Attempt any THREE of the following : 12
(a) Explain the term Authorization and Authentication with respect to security.
(b) Write an algorithm for simple columnar transposition technique and explain
with example.
(c) Describe DMZ with suitable example.
(d) Write short note on DAC & MAC.

4. Attempt any THREE of the following : 12


(a) Write a short note on steganography.
(b) Explain Honey pots.
(c) Explain Host based IDS.
(d) Describe working principle of SMTP.
(e) Explain creation and verification of digital signature.

5. Attempt any TWO of the following : 12


(a) Explain any three criteria for classification of information.
(b) List types of firewall and explain any one of them.
(c) Explain IP sec security with help of diagram.

6. Attempt any TWO of the following : 12


(a) Define virus and describe the phases of virus.
(b) Explain Kerberos with help of suitable diagram.
(c) Write a brief note on firewall configurations.

_______________

You might also like