## TOPICS (Click to Navigate)

`  I request GUEST WRITERS for this web site. Anyone interested please contact me at saravu2k2013@gmail.com Thanks  `
Showing posts with label Previous Year Questions. Show all posts
Showing posts with label Previous Year Questions. Show all posts

## Thursday, 10 March 2016

### IT2352 CRYPTOGRAPHY AND NETWORK SECURITY April May 2015

Anna University Questions - IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY, April may 2015, Computer Science and Engineering, Seventh Semester, Regulation 2008/2010

 Exam B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS Academic Year April May 2015 Subject Code IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 Subject Name Cryptography and Network Security Branch Computer Science and Engineering Semester Seventh Semester Regulation 2008/2010

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Seventh Semester
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Information Technology)
(Regulations 2008/2010)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 3.
3. Differentiate between stream ciphers and block ciphers.
4. State few applications of RC4 algorithm.
5. What is primitive root?
6. What is digital signature?
7. When are the certificates revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantage of intrusion detection system over firewall?

Part-B (5* 16 = 80 Marks)

11. (a) Explain the substitution encryption techniques in detail. (16)
Or
(b) State and derive
(i) Fermat’s theorem. (8)
(ii) Euler’s theorem. (8)

12. (a) Explain Data Encryption Standard (DES) in detail. (16)
Or
(b) Explain the RSA algorithm in detail. For the given values, trace the sequence of calculations in RSA. p=7, q=13, e=5, and m=10. (16)

13. (a) Explain ElGamal public key cryptosystems with an example. (16)
Or
(b) Explain secure hash in detail. (16)

14. (a) Explain Kerberos Version 4 in detail. (16)
Or
(b) Explain Secure Socket Layer (SSL) in detail. (16)

15. (a) Write brief notes on the following;
(i) Classification of viruses. (8)
(ii) Worm Counter measures. (8)
Or
(b) Explain the characteristics and types of firewalls. (16)

************************

## Anna University Questions - CS6551 Computer Networks April May 2015, Computer Science and Engineering, Fourth semester, Regulation 2013

Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
April May 2015
Subject Code

Subject Name

## Computer Networks

Branch
Computer Science and Engineering
Semester
Fourth Semester
Regulation
2013

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Fourth Semester
CS6551 COMPUTER NETWORKS
(Regulations 2013)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. What do you mean by error control?
2. Define flow control.
3. What do you understand by CSMA protocol?
4. List the functions of bridges.
5. How does a router differ from bridge?
6. What are the metrics used by routing protocols?
7. List some of the Quality of Service parameters of transport layer.
8. How does transport layer perform duplication control?
9. Define SMTP.
10. What are the groups of HTTP header?

Part-B (5* 16 = 80 Marks)

11. (a) Discuss in detail about Internet Architecture. (16)
Or
(b) What is the need for error detection? Explain with typical examples. Explain methods used for error detection and error correction. (16)

12. (a) Explain in detail about the access method and frame format used in Ethernet and token ring. (16)
Or
(b) (i) Discuss the MAC layer functions of IEEE802.11. (8)
(ii) Briefly define key requirements of wireless LAN. (8)

13. (a) Explain the shortest path algorithm with suitable illustrations. (16)
Or
(b) Explain the distance vector routing algorithm. Mention the limitations of the same. (16)

14. (a) Explain the various fields of the TCP header and the working of the TCP protocol. (16)
Or
(b) (i) Explain the three way handshake protocol to establish the transport level connection. (8)
(ii) List the various congestion control mechanisms. Explain any one in detail. (8)

15. (a) (i) Explain the message transfer using Simple Mail Transfer Protocol. (8)
(ii) Explain the final delivery of email to the end user using POP3. (8)
Or
(b) Write short notes on
(i) Web services (8)
(ii) SNMP (8)

************************

## Anna Universtiy BE CSE Eighth Semester Regulation 2004 and 2008 Questions, Anna University Previous Years Exam Questions, Computer Science and Engineering Question papers

Anna University
BE/B.Tech CSE Eighth Semester
Regulation 2004 and 2008

### Simple introduction to Naive Bayes classifier

Simple introduction to Naive Bayes classifier What is Naive Bayes Classifier? A Naive Bayes classifier is a probabilistic classifier ...