Download Model question papers & previous years question papers

Posted Date: 05 May 2016      Posted By:: Krishna Teja Yeluripati    Member Level: Gold  Points: 3 (Rs. 3)

2016 B.Tech Computer Science and Engineering Acharya Nagarjuna University - B.Tech - CSE - Question Paper - April 2016 - CS321 - Network Security (NS) Question paper



Course: B.Tech Computer Science and Engineering   University/board: Acharya Nagarjuna University

If you are looking for the Acharya Nagarjuna University - B.Tech - CSE - CS321- Network Security (NS) previous question papers, you are in the right place. This is the April 2016 question paper of 3/4 B.Tech - 2nd Semester conducted by Acharya Nagarjuna University. You can download it from here and use it to prepare for exams.




[Total No. of Questions : 09]

CS/IT 321 (CR)



III/IV B.Tech Degree Examinations, March - April 2016

Second Semester

CS/IT

Network Security



Time : 3 hours

Maximum Marks : 70



Answer question No.1 Compulsory

Answer ONE question from each Unit


1. Briefly explain following [7 x 2 = 14M]
a) Security services
b) Rotor machines
c) Testing for primality
d) Message authentication code
e) Euler's totient
f) Firewalls
g) Weaknesses of a packet-filtering router

UNIT - I [1 x 14 = 14M]

2. a) What are the various components of symmetric cipher model? Explain.
2. b) What are the two basic functions used in encryption algorithms?
2. c) How many keys are required for two people to communicate via a cipher? (OR)
3. a) What are the differences between RC5 and RC2?
3. b) Explain various modes of operations of block ciphers.

UNIT - II [1 x 14 = 14M]

4. a) List four general categories of schemes for distribution of public keys.
4. b) Explain Chinese Remainder Theorem. (OR)
5. a) Explain public key Crypto Systems.
5. b) Explain in detail about Euclid's Algorithm.
5. c) Give a brief account on Random number Generation.

UNIT - III [1 x 14 = 14M]

6. Define digital Signature. Explain its role in network security. (OR)
7. a) What is R64 conversion? Why is R64 conversion useful for an e-mail application? Explain.
7. b) Write a brief on HMAC.

UNIT - IV [1 x 14 = 14M]

8. a) What problem was Kerberos designed to address?
8. b) What are the three threats associated with user authentication over a network or Internet?
8. c) Write a brief on Intrusion detection. (OR)
9. Write a short note on
a) Electronic mail Services
b) Firewalls.
c) Trusted Systems





Return to question paper search

Next Question Paper: Karnataka State Eligibility Test Lecturership Examination 2014 of University of Mysore, Sanskrit, Paper II Kannada and English version

Previous Question Paper: Acharya Nagarjuna University - B.Tech - CSE - Question Paper - April 2016 - Compiler Design (CD) - CS322

Related Question Papers:


  • May 2015, Achaya Nagarjuna University B.Tech. (EC) - III YEAR Distance Mode Question Paper


  • May 2015, Achaya Nagarjuna University B.Tech. (EC) - II YEAR Distance Mode Question Paper


  • May 2015, Achaya Nagarjuna University B.Tech. (EC) - I YEAR Distance Mode Question Paper


  • May 2015, Achaya Nagarjuna University B.Tech. (EEE) - IV YEAR Distance Mode Question Paper


  • Acharya Nagarjuna University - B.Tech - CSE - CS325C - Multimedia Systems (MM) - April 2016 - Question Paper


  • Categories


    Submit Previous Years University Question Papers and make money from adsense revenue sharing program

    Are you preparing for a university examination? Download model question papers and practise before you write the exam.


    Awards & Gifts
    Top Contributors
    TodayLast 7 Daysmore...

     
    ISC Technologies, Kochi - India. © All Rights Reserved.