6382 Network Security and Management 6382 S 2019

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

S/2019/6382 [1] Total Pages : 4

Sixth Semester
Computer Science and Engineering
Scheme July 2009
NETWORK SECURITY AND MANAGEMENT
Time : Three Hours Maximum Marks : 100
Note : i) Attempt total six questions. Question No. 1 (Objective type)
is compulsory. From the remaining questions attempt any five.
Hw$b N>… àíZ hb H$s{OE& àíZ H«$‘m§H$ 1 (dñVw{Zð> àH$ma H$m)
A{Zdm¶© h¡& eof àíZm| ‘| go {H$Ýht nm±M H$mo hb H$s{OE&
ii) In case of any doubt or dispute, the English version question
should be treated as final.
{H$gr ^r àH$ma Ho$ g§Xoh AWdm {ddmX H$s pñW{V ‘| A§J«oOr ^mfm Ho$
àíZ H$mo A§{V‘ ‘mZm Om¶oJm&

1. Choose the correct answer. 2 each


ghr CÎma H$m M¶Z H$s{OE &
i) SSL is:
(a) Secure Socket Layer
(b) Secure Server Layer
(c) Sequence Socket Layer
(d) None of the above
Eg.Eg.Eb. h¡
(A) {g³¶moa gm°Ho$Q> bo¶a
(~) {g³¶moa gd©a bo¶a
(g) gr³d|g gm°Ho$Q> bo¶a
(X) Cnamo³V _§o go H$moB© Zht
ii) To use Simple Network Management Protocol (SNMP) we need
(a) Entities (b) Frames
(c) Standard types (d) Rules

S/2019/6382 P.T.O.

www.rgpvonline.com
[2]

qgnb ZoQ>dH©$ ‘oZoO‘|Q> àmoQ>moH$m°b H$m Cn¶moJ H$aZo Ho$ {b¶o, h‘| Mm{hE
(A) EÝQ>rQ>rg (~) ’«o$åg
(g) ñQ>¡ÝS>S>© Ho$ àH$ma (X) ê$ëg
iii) The art of braking cipher is known as:
(a) Cryptology (b) Cryptography
(c) Cryptanalysis (d) Crypting
~«oqH$J {g’$a H$s H$bm Ho$ ê$n ‘| OmZm OmVm h¡
(A) {H«$ßQ>mobm°Or (~) {H«$ßQ>moJ«m’$s
(g) {H«$ßQ>mZmbr{gg (X) {H«$nqQ>J
iv) Transform message in to format (cyber text) that can not be read
by hackers.
(a) Decryption (b) Encryption
(c) Transformation (d) None of the above
’$m‘}Q> (gm¶~a Q>o³ñQ>) ‘| g§Xoe H$mo Q´>m§g’$m‘© H$ao {Ogo h¡H$ag Ûmam n‹T>m
Zht Om gH$Vm h¡
(A) {S>{H«$ßeZ (~) EpÝH«$ßeZ
(g) Q´>mg§ ’$ma‘oeZ (X) Cnamo³V _| go H$moB© Zht
v) Which of the following is a secret numeric password used for
authentication?
(a) Security token (b) Digital Certificate
(c) Digital Signature (d) PIN
{ZåZ{b{IV ‘| go EH$ Am°W|{Q>Ho$eZ Ho$ {bE Cn¶moJ {H$¶m OmZo dmbm EH$
Jwá g§»¶mË‘H$ nmgd‹S>© h¡
(A) {g³¶mo[aQ>r Q>moH$Z (~) {‹S>{OQ>b g{Q>©’$sHo$Q>
(g) {‹S>{OQ>b {g½ZoMa (X) {nZ

2. a) What do you understand by network security? Explain in detail.


9
ZoQ>dH©$ {g³¶mo[aQ>r go Amn ³¶m g‘PVo h¡? {dñVma go g‘PmBE&
S/2019/6382 Contd.....

www.rgpvonline.com
[3]

b) Explain the security issues in detail. 9


{g³¶mo[aQ>r Bí¶yO H$mo {dñVma go g‘PmBE&
3. a) What do you understand by security Awareness? Explain in detail.
9
{g³¶mo[aQ>r Ado¶aZog go Amn ³¶m g‘PVo h¡? {dñVma go g‘PmBE&
b) What is security control? Describe the procedural control in brief.
9
{g³¶mo[aQ>r H$ÝQ´>mob ³¶m h¡? g§jon ‘| à{H«$¶mË‘H$ {Z¶§ÌU H$m dU©Z H$a|&
4. a) What is Cryptography? Briefly describe the substitution cipher.
9
{H«$ßQ>moJ«m’$s ³¶m h¡? g§jon ‘| g~{gQ>çyeZ {g’$a H$m dU©Z H$a|&
b) Briefly describe the stream cipher and block cipher. 9
g§jon ‘| ñQ´>r‘ {g’$a Ed§ ãbm°H$ {g’$a H$m dU©Z H$a|&
5. a) Explain the windows NT networking Architecture in detail. 9
{dÝS>moO EZ Q>r ZoQ>dH$sªJ Am{H©$Q>o³Ma H$mo {dñVma go g‘PmBE&
b) Explain the Security model Architecture in detail. 9
{g³¶mo[aQ>r ‘m°S>b Am{H©$Q>o³Ma H$mo {dñVma go g‘PmBE&
6. a) Briefly describe the Simple Network Management Protocol
(SNMP) for Network management. 9
ZoQ>dH©$ ‘oZO
o ‘|Q> Ho$ {bE {gånb ZoQ>dH©$ ‘oZO
o ‘|Q> àmoQ>mHo $m°b (Eg.EZ.E‘.nr.)
H$m g§jon ‘| dU©Z H$a|&
b) Explain Reserving IP address in detail. 9
[aO{dªJ IP ES´>og H$mo {dñVma go g‘PmBE&
7. a) Explain the TCP/IP troubleshooting tools in detail. 9
{Q>grnr/AmB© nr Q´>~bewqQ>J Qy>ëg H$mo {dñVma go g‘PmBE&
b) What do you understand by MAC address and ARP? Explain.
9
MAC ES´>og Ed§ ARP go Amn ³¶m g‘PVo h¡, g‘PmBE&

S/2019/6382 P.T.O.

www.rgpvonline.com
[4]

8. Write short notes on any three. 6 each


a) Types of Security
b) Single Sign on
c) Encryption
d) WINS
e) Point to point protocol.
{H$Ýht VrZ na g§{já {Q>ßnUr {b{IE&
A) {g³¶mo[aQ>r Ho$ àH$ma
~) qgJb Sign Am°Z
g) EpÝH«$ßeZ
X) WINS
B) nm°BÝQ> Qy> nm°BÝQ> àmoQ>moH$m°b

S/2019/6382

www.rgpvonline.com

You might also like