TOPICS (Click to Navigate)
- Advanced Database Concepts
- Data structures, Operating Systems
- Natural Language Processing
- Quiz Questions and Answers
- DBMS, ADBMS Question Bank
- SQL
- RDBMS Exam and Interview Questions
- Parallel Databases
- ADBMS Quizzes
- Advanced DBMS Concepts
- Distributed Databases
- Modern Databases - Special Purpose Databases
- Object Based Database Systems
Showing posts with label Anna University Exam Questions. Show all posts
Showing posts with label Anna University Exam Questions. Show all posts
Thursday, March 24, 2016
Thursday, March 10, 2016
IT2352 CRYPTOGRAPHY AND NETWORK SECURITY April May 2015
Anna University Questions - IT2352 / IT62 / 10144 IT 603
/ 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY, April may 2015, Computer Science and Engineering, Seventh Semester, Regulation 2008/2010
Exam
|
B.E/B.Tech. (Full
Time) DEGREE END SEMESTER EXAMINATIONS
|
Academic
Year
|
April May 2015
|
Subject
Code
|
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46
|
Subject
Name
|
Cryptography and Network Security
|
Branch
|
Computer Science and Engineering
|
Semester
|
Seventh Semester
|
Regulation
|
2008/2010
|
B.E
/ B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science
and Engineering
Seventh Semester
IT2352
/ IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY
(Common to
Information Technology)
(Regulations 2008/2010)
Time : 3 Hours Answer A L L Questions Max. Marks 100
PART-A
(10 x 2 = 20 Marks)
1. Differentiate between active
attacks and passive attacks.
2. Find 117 mod 3.
3. Differentiate between stream
ciphers and block ciphers.
4. State few applications of RC4
algorithm.
5. What is primitive root?
6. What is digital signature?
7. When are the certificates revoked
in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantage of intrusion
detection system over firewall?
Part-B
(5* 16 = 80 Marks)
11. (a) Explain the substitution
encryption techniques in detail. (16)
Or
(b) State and derive
(i) Fermat’s theorem. (8)
(ii) Euler’s theorem. (8)
12. (a) Explain Data Encryption
Standard (DES) in detail. (16)
Or
(b) Explain the RSA algorithm in
detail. For the given values, trace the sequence of calculations in RSA. p=7, q=13,
e=5, and m=10. (16)
13. (a) Explain ElGamal public key
cryptosystems with an example. (16)
Or
(b) Explain secure hash in detail. (16)
14. (a) Explain Kerberos Version 4 in
detail. (16)
Or
(b) Explain Secure Socket Layer (SSL)
in detail. (16)
15. (a) Write brief notes on the following;
(i) Classification of viruses. (8)
(ii) Worm Counter measures. (8)
Or
(b) Explain the characteristics and
types of firewalls. (16)
************************
CS6551 Computer Networks April May 2015
Anna University Questions - CS6551 Computer Networks April May 2015, Computer Science and Engineering, Fourth semester, Regulation 2013
Exam
|
B.E/B.Tech. (Full
Time) DEGREE END SEMESTER EXAMINATIONS
|
Academic
Year
|
April May 2015
|
Subject
Code
|
CS6551 |
Subject
Name
|
Computer Networks |
Branch
|
Computer Science and Engineering
|
Semester
|
Fourth Semester
|
Regulation
|
2013
|
B.E
/ B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science
and Engineering
Fourth Semester
CS6551
COMPUTER NETWORKS
(Regulations 2013)
Time : 3 Hours Answer A L L Questions Max. Marks 100
PART-A
(10 x 2 = 20 Marks)
1. What do you mean by error control?
2. Define flow control.
3. What do you understand by CSMA
protocol?
4. List the functions of bridges.
5. How does a router differ from
bridge?
6. What are the metrics used by
routing protocols?
7. List some of the Quality of Service
parameters of transport layer.
8. How does transport layer perform
duplication control?
9. Define SMTP.
10. What are the groups of HTTP header?
Part-B
(5* 16 = 80 Marks)
11. (a) Discuss in detail about
Internet Architecture. (16)
Or
(b) What is the need for error
detection? Explain with typical examples. Explain methods used for error detection
and error correction. (16)
12. (a) Explain in detail about the
access method and frame format used in Ethernet and token ring. (16)
Or
(b) (i) Discuss the MAC layer
functions of IEEE802.11. (8)
(ii) Briefly define key requirements
of wireless LAN. (8)
13. (a) Explain the shortest path
algorithm with suitable illustrations. (16)
Or
(b) Explain the distance vector
routing algorithm. Mention the limitations of the same. (16)
14. (a) Explain the various fields of
the TCP header and the working of the TCP protocol. (16)
Or
(b) (i) Explain the three way handshake
protocol to establish the transport level connection. (8)
(ii) List the various congestion
control mechanisms. Explain any one in detail. (8)
15. (a) (i) Explain the message transfer
using Simple Mail Transfer Protocol. (8)
(ii) Explain the final delivery of
email to the end user using POP3. (8)
Or
(b) Write short notes on
(i) Web services (8)
(ii) SNMP (8)
************************
Subscribe to:
Posts (Atom)
Featured Content
Multiple choice questions in Natural Language Processing Home
MCQ in Natural Language Processing, Quiz questions with answers in NLP, Top interview questions in NLP with answers Multiple Choice Que...
All time most popular contents
-
Relational algebra in database management systems solved exercise Relational algebra – solved exercise Question: Consider the fo...
-
Top 5 Machine Learning Quiz Questions with Answers explanation, Interview questions on machine learning, quiz questions for data scienti...
-
Solved Exercises - Reducing Entity Relationship Diagram into Tables, Convert ER diagram to tables, relational schemas, ER model to relat...
-
Set of solved exercises in Normalization / Normalization Solved Examples / How to find candidate keys, and primary keys in database? /...
-
Parallel query execution - example SQL queries / Inter-query, Intra-query parallelism examples / Inter-operation and Intra-operation paral...