No.
of Printed Pages : 4 MSEI-022
P, G. DIPLOMA IN INFORMATION
SECURITY (PGDIS)
Term-End Examination
June, 2020
MSEI-022 : NETWORK SECURITY
Time : 2 Hours Maximum Marks : 50
Note : (i) Section A: Answer all the objective type
questions.
(ii) Section B : Answer all the very short
answer type questions.
(iii) Section C : Answer any two out of three
short answer type questions.
(iv) Section D : Answer an y two out of three
long answer type questions.
Section—A
1. Write true or false : 1 each
(a) IPSec is designed to provide the security at
the transport layer.
P. T. O.
[2] MSEI-022
(b) A firewall is a device with set of rules to
permit ordinary network access by
unauthorized services.
(c) Fingerprints can be used for identification.
(d) Network layer firewall is only stateful
never stateless firewall.
(e) The private key of digital signature is used
by the sender.
2. Fill in the blanks : 1 each
(a) A is a software or hardware based
network security system that controls the
incoming and outgoing network traffic
based on applied rule-set.
(b) is a secret-key network
authentication service developed at MIT by
Project Athena.
(c) Full form of CHAP is
[ 31 MSEI-022
(d) Algorithm for performing encryption and
decryption is known as
(e) port is used for SMTPS + TLS
security.
Section—B
3. Write short notes on the following : 2 each
(a) Asymmetric cryptography
(b) Trojan horses
(c) Port Scanning tools
(d) Biometrics
(e) Public key infrastructure
Section—C
4. Explain security issues involved in wireless. 5
5. Discuss the types of digital watermarks. 5
6. Explain IDS and IPS. Is honey pot and IDS or
IPS ?Justify your answer. 5
P. T. 0.
[ 4I MSEI-022
Section—D
7. Explain next generation networks. 10
8. Explain identity management. What does
Single Sign On (SSO) mean and how is it
typically implemented ? 10
9. Explain the role of a firewall in securing the
network. Describe different types of firewall. 10
MESI-022
No. of Printed Pages : 5 MSEI-022
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
February, 2021
MSEI-022 : NETWORK SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.
SECTION A
Answer all the questions.
1. Write True or False : 51=5
(a) Network layer firewall is only Stateful,
never Stateless firewall.
(b) Hyper Text Transfer Protocol (http) is a
means for transmitting and receiving
information across the internet.
MSEI-022 1 P.T.O.
(c) WEP is more secure than WPA2 Protocol.
(d) The main objective of SSL is
authenticating the client and server to
each other.
(e) Digital Signature requires the sender to
use the private key.
2. Fill in the blanks : 51=5
(a) A ________ is a device that forwards
packets between networks by processing
the routing information in the packet.
(b) DES is a ________ Cipher.
(c) Full form of LDAP is ________.
(d) Algorithm for performing encryption and
decryption is known as ________.
(e) PGP stands for ________.
MSEI-022 2
SECTION B
Attempt all the questions.
3. Write short notes on the following : 52=10
(a) Biometrics
(b) IDS
(c) Risk Analysis
(d) Honey Pots
(e) Digital Watermarking
MSEI-022 3 P.T.O.
SECTION C
Answer any two questions out of the three short
answer type questions.
4. Explain Fingerprinting technique of identity
management. 5
5. Explain the main features of a Hash function. 5
6. Explain how key distribution is achieved in
Symmetric key encryption. 5
MSEI-022 4
SECTION D
Answer any two questions out of three long answer
type questions.
7. Explain the concept of Network Based,
Application Based and Host Based Firewalls in
detail. 10
8. Explain Identity Management. What does Single
Sign On (SSO) mean and how is it typically
implemented ? 10
9. Explain the basic scanning techniques in detail. 10
MSEI-022 5 P.T.O.
No. of Printed Pages : 5 MSEI-022
P.G. DIPLOMA IN INFORMATION SECURITY
(PGDIS)
Term-End Examination
June, 2021
MSEI-022 : NETWORK SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.
SECTION A
Answer all the questions.
1. Write True or False : 51=5
(a) Symmetric encryption is best used for
small blocks of data, digital signatures,
digital envelopes and digital certificates.
(b) IPSec is designed to provide security at the
transport layer.
MSEI-022 1 P.T.O.
(c) Bluetooth is an example of PAN.
(d) Full form of PGP is Pretty Good Privacy.
(e) WEP is less secure than WPA.
2. Fill in the blanks : 51=5
(a) The signal where the watermark is to be
embedded is called the __________ .
(b) An attempt to make a computer resource
unavailable to users is called __________
attack.
(c) A network of compromised devices owned
by attackers is known as ___________ .
(d) The multiple access technique used by
IEEE 802.11 standard for wireless LAN is
___________ .
(e) __________ can be defined as the practice
and study of hiding information.
MSEI-022 2
SECTION B
Answer all the questions.
3. Write short notes on the following : 52=10
(a) E-mail spoofing
(b) Trojan horses
(c) Hash function
(d) Port scanning tools
(e) Routers
MSEI-022 3 P.T.O.
SECTION C
Answer any two questions out of three short answer
type questions.
4. Illustrate the difference between symmetric
cryptography and asymmetric cryptography. 5
5. Explain in detail about ‘‘Key’’ establishment and
its types. 5
6. Explain Vulnerabilities, Threats, Attacks and
Controls with suitable example of each. 5
MSEI-022 4
SECTION D
Answer any two questions out of three long answer
type questions.
7. Explain types of Firewalls with the help of
diagram. 10
8. Explain Diffie-Hellman key exchange protocol. Is
it prone to MITM attack ? Why or why not ?
Discuss and explain. 10
9. Explain Network Layer Attack. Discuss Packet
Sniffing in detail. 10
MSEI-022 5 P.T.O.
[2] MSEI-022
(b) Digital signature requires the sender to
No. of Printed Pages : 4 MSEI-022
use the private key.
P. G. DIPLOMA IN INFORMATION (c) Bluetooth is an example of PAN.
SECURITY (PGDIS) (d) SING is a GUI scanning technique.
Term-End Examination
(e) Full form of PGP is Pretty Good Privacy.
December, 2021
MSEI-022 : NETWORK SECURITY 2. Fill in the blanks : 1 each
Time : 2 Hours Maximum Marks : 50 (a) Full form of CHAP is ................ .
Note : Section A : Answer all the Objective type (b) Firewalls are often configured to block
questions.
.............. traffic.
Section B : Answer all the Very short answer (c) The signal where the watermark is to be
type questions.
embedded is called the .................. .
Section C : Answer 2 out of 3 Short answer
(d) DES is a ................ cipher.
type questions.
(e) Kerberos is a ................. key authentication
Section D : Answer 2 out of 3 Long answer
type questions. service developed at MIT.
Section—B
Section—A Note : Attempt all the very short answer type
Note : Attempt all objective type questions.
questions.
1. Write True or False : 1 each
3. Write short notes on the following : 2 each
(a) Network layer firewall works as a Packet
Filter. (a) Hash function
P. T. O.
[3] MSEI-022 [4] MSEI-022
(b) E-mail spoofing 8. Describe the security protocols in detail, with
(c) Biometrics suitable examples. 10
(d) Honey pots 9. Describe identity management. What does
(e) Session hijacking Single Sign On (SSO) mean and how is it
Section—C typically implemented ? 10
Note : Attempt 2 out of 3 short answer type
questions.
4. What is digital signature ? Describe a public
key method to create and check digital
signatures. 5
5. Explain the difference between symmetric
cryptography and asymmetric cryptography. 5
6. Discuss the types of digital watermarks. 5
Section—D
Note : Attempt 2 out of 3 long answer type
questions.
7. Explain the role of a firewall in securing the
network. Describe different types of firewalls.
10 MSEI–022
P. T. O.
No. of Printed Pages : 5 MSEI-022
MASTER OF SCIENCE (INFORMATION
SECURITY) (MSCIS) / P.G. DIPLOMA IN
INFORMATION SECURITY (PGDIS)
Term-End Examination
June, 2022
MSEI-022 : NETWORK SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the objective type questions.
Section B – Answer all the very short answer type
questions.
Section C – Answer any two questions out of three short
answer type questions.
Section D – Answer any two questions out of three long
answer type questions.
SECTION A
Answer all the questions.
1. Write True or False : 51=5
(a) Fingerprints can be used for identification.
(b) Network layer firewall is always stateful
and never stateless.
MSEI-022 1 P.T.O.
(c) Hypertext Transfer Protocol (http) is
meant to transmit and receive information
across the Internet.
(d) WEP is more secure than WPA-2 Protocol.
(e) TLS and SSL are protocols used at
Network layer.
2. Fill in the blanks : 51=5
(a) Video watermarking, Audio watermarking,
Text watermarking, etc. are applications of
___________ .
(b) The full form of LDAP is __________ .
(c) A ___________ is a physical trait that
consists of facial structure, eye colour,
voice, iris, pattern and fingerprint.
(d) Algorithms for performing encryption and
decryption are known as __________
algorithms.
(e) A network of compromised devices owned
by attackers are known as ____________ .
MSEI-022 2
SECTION B
Answer all the questions.
3. Write short notes on the following : 52=10
(a) Pretty Good Privacy
(b) Port Scanning Tools
(c) Public Key Infrastructure
(d) Intrusion Detection System
(e) Routers
MSEI-022 3 P.T.O.
SECTION C
Answer any two questions out of three short answer
type questions. 25=10
4. Explain how key distribution is achieved in
symmetric key encryption. 5
5. Illustrate the difference between SSH and SSL.
Which one is more secure ? Which of the
two, i.e. SSH and SSL has more potential
vulnerabilities ? Explain. 5
6. Describe the main properties of Digital
Signatures. 5
MSEI-022 4
SECTION D
Answer any two questions out of three long answer
type questions. 210=20
7. What are various security issues in wireless
connections ? Explain the process of WEP
encryption and WEP decryption, with the help of
a suitable diagram. 10
8. Explain authentication mechanism, with the help
of a suitable diagram. 10
9. Describe IDS and IPS. Is Honey Pot an IDS or an
IPS ? Justify your answer. 10
MSEI-022 5 P.T.O.
No. of Printed Pages : 3 MSEI-022
MASTER OF SCIENCE (INFORMATION
SECURITY) (MSCIS) / P.G. DIPLOMA IN
INFORMATION SECURITY (PGDIS)
Term-End Examination
December, 2022
MSEI-022 : NETWORK SECURITY
Time : 2 hours Maximum Marks : 50
Note :
Section A – Answer all the questions.
Section B – Answer any two out of three questions.
Section C – Answer any two questions out of three long
answer type questions.
SECTION A
Answer all the questions.
1. Write notes on the following : 54=20
(a) Trojan Horse
(b) E-mail Spoofing
(c) Port Scanning Tools
(d) Pretty Good Privacy
(e) Undeniable Signatures
MSEI-022 1 P.T.O.
SECTION B
Answer any two out of three questions. 25=10
2. Describe the types of digital watermarks. 5
3. What is the difference between Symmetric and
Asymmetric Cryptography ? 5
4. What are the main properties of a Hash
Function ? 5
MSEI-022 2
SECTION C
Answer any two questions out of three long answer
type questions. 210=20
5. Describe the role of a firewall in securing the
network. Also explain different types of firewalls. 10
6. Explain Identity Management. What does Single
Sign On (SSO) mean and how is it typically
implemented ? 10
7. Explain Diffie Hellman’s key exchange protocol.
Is it prone to MITM attack ? Why or why not ?
Discuss and explain. 10
MSEI-022 3 P.T.O.
No. of Printed Pages : 3 MSEI-022
MASTER OF SCIENCE
(INFORMATION SECURITY) /
P. G. DIPLOMA IN INFORMATION
SECURITY (MSCIS / PGDIS)
Term-End Examination
June, 2023
MSEI-022 : NETWORK SECURITY
Time : 2 Hours Maximum Marks : 50
Note : Section A : Answer all the questions.
Section B : Answer any two out of three
questions.
Section C : Answer any two out of three long
answer type questions.
Section—A
Note : Attempt all the questions.
1. Write notes on the following : 5×4=20
(a) Intrusion Detection System
P. T. O.
[2] MSEI-022
(b) Hash function
(c) Digital watermarking
(d) Dictionary attack
(e) Honey pots
Section—B
Note : Attempt two out of three questions.
2. Describe fingerprinting technique of identity
management. 5
3. Briefly explain main properties of digital
signatures. 5
4. Define vulnerabilities, threats, attacks and
controls with suitable example of each. 5
Section—C
Note : Attempt two out of three long answer type
questions.
5. Describe the concept of Network Based,
Application Based and Host Based Firewalls in
detail. 10
[3]
6. What is cryptography ? Explain the different
stages of cryptology in detail. 10
7. What are various security issues in wireless ?
Explain the process of WEP encryption and
WEB decryption with the help of a suitable
diagram. 10
MSEI–022