Posted Date: 05 May 2016      Posted By:: Krishna Teja Yeluripati    Member Level: Gold  Points: 3 (Rs. 3)

# 2016 B.Tech Computer Science and Engineering Acharya Nagarjuna University - B.Tech - CSE - Question Paper - April 2016 - CS321 - Network Security (NS) Question paper

 Course: B.Tech Computer Science and Engineering University/board: Acharya Nagarjuna University

If you are looking for the Acharya Nagarjuna University - B.Tech - CSE - CS321- Network Security (NS) previous question papers, you are in the right place. This is the April 2016 question paper of 3/4 B.Tech - 2nd Semester conducted by Acharya Nagarjuna University. You can download it from here and use it to prepare for exams.

[Total No. of Questions : 09]

CS/IT 321 (CR)

III/IV B.Tech Degree Examinations, March - April 2016

Second Semester

CS/IT

Network Security

Time : 3 hours

Maximum Marks : 70

Answer ONE question from each Unit

1. Briefly explain following [7 x 2 = 14M]
a) Security services
b) Rotor machines
c) Testing for primality
d) Message authentication code
e) Euler's totient
f) Firewalls
g) Weaknesses of a packet-filtering router

UNIT - I [1 x 14 = 14M]

2. a) What are the various components of symmetric cipher model? Explain.
2. b) What are the two basic functions used in encryption algorithms?
2. c) How many keys are required for two people to communicate via a cipher? (OR)
3. a) What are the differences between RC5 and RC2?
3. b) Explain various modes of operations of block ciphers.

UNIT - II [1 x 14 = 14M]

4. a) List four general categories of schemes for distribution of public keys.
4. b) Explain Chinese Remainder Theorem. (OR)
5. a) Explain public key Crypto Systems.
5. b) Explain in detail about Euclid's Algorithm.
5. c) Give a brief account on Random number Generation.

UNIT - III [1 x 14 = 14M]

6. Define digital Signature. Explain its role in network security. (OR)
7. a) What is R64 conversion? Why is R64 conversion useful for an e-mail application? Explain.
7. b) Write a brief on HMAC.

UNIT - IV [1 x 14 = 14M]

8. a) What problem was Kerberos designed to address?
8. b) What are the three threats associated with user authentication over a network or Internet?
8. c) Write a brief on Intrusion detection. (OR)
9. Write a short note on
a) Electronic mail Services
b) Firewalls.
c) Trusted Systems

### Related Question Papers:

• May 2015, Achaya Nagarjuna University B.Tech. (EC) - III YEAR Distance Mode Question Paper

• May 2015, Achaya Nagarjuna University B.Tech. (EC) - II YEAR Distance Mode Question Paper

• May 2015, Achaya Nagarjuna University B.Tech. (EC) - I YEAR Distance Mode Question Paper

• May 2015, Achaya Nagarjuna University B.Tech. (EEE) - IV YEAR Distance Mode Question Paper

• Acharya Nagarjuna University - B.Tech - CSE - CS325C - Multimedia Systems (MM) - April 2016 - Question Paper

• ### Categories

Submit Previous Years University Question Papers and make money from adsense revenue sharing program

Are you preparing for a university examination? Download model question papers and practise before you write the exam.

 Join Group