Showing posts with label Previous Year Questions. Show all posts
Showing posts with label Previous Year Questions. Show all posts

Thursday, March 10, 2016

IT2352 CRYPTOGRAPHY AND NETWORK SECURITY April May 2015

Anna University Questions - IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY, April may 2015, Computer Science and Engineering, Seventh Semester, Regulation 2008/2010



Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2015
Subject Code
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46
Subject Name
Cryptography and Network Security
Branch
Computer Science and Engineering
Semester
Seventh Semester
Regulation
2008/2010

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Seventh Semester
IT2352 / IT62 / 10144 IT 603 / 10144 CSE 46 CRYPTOGRAPHY AND NETWORK SECURITY
(Common to Information Technology)
(Regulations 2008/2010)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. Differentiate between active attacks and passive attacks.
2. Find 117 mod 3.
3. Differentiate between stream ciphers and block ciphers.
4. State few applications of RC4 algorithm.
5. What is primitive root?
6. What is digital signature?
7. When are the certificates revoked in X.509?
8. What is tunnel mode in IP security?
9. Define worm.
10. What is the advantage of intrusion detection system over firewall?

Part-B (5* 16 = 80 Marks)

11. (a) Explain the substitution encryption techniques in detail. (16)
Or
(b) State and derive
(i) Fermat’s theorem. (8)
(ii) Euler’s theorem. (8)

12. (a) Explain Data Encryption Standard (DES) in detail. (16)
Or
(b) Explain the RSA algorithm in detail. For the given values, trace the sequence of calculations in RSA. p=7, q=13, e=5, and m=10. (16)

13. (a) Explain ElGamal public key cryptosystems with an example. (16)
Or
(b) Explain secure hash in detail. (16)

14. (a) Explain Kerberos Version 4 in detail. (16)
Or
(b) Explain Secure Socket Layer (SSL) in detail. (16)

15. (a) Write brief notes on the following;
(i) Classification of viruses. (8)
(ii) Worm Counter measures. (8)
Or
(b) Explain the characteristics and types of firewalls. (16)

************************












CS6551 Computer Networks April May 2015

Anna University Questions - CS6551 Computer Networks April May 2015, Computer Science and Engineering, Fourth semester, Regulation 2013




Exam
B.E/B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS
Academic Year
April May 2015
Subject Code

CS6551

Subject Name

Computer Networks

Branch
Computer Science and Engineering
Semester
Fourth Semester
Regulation
2013

B.E / B.Tech. (Full Time) DEGREE END SEMESTER EXAMINATIONS, APRIL / MAY 2015
Computer Science and Engineering
Fourth Semester
CS6551 COMPUTER NETWORKS
(Regulations 2013)
Time : 3 Hours                      Answer A L L Questions                Max. Marks 100
PART-A (10 x 2 = 20 Marks)

1. What do you mean by error control?
2. Define flow control.
3. What do you understand by CSMA protocol?
4. List the functions of bridges.
5. How does a router differ from bridge?
6. What are the metrics used by routing protocols?
7. List some of the Quality of Service parameters of transport layer.
8. How does transport layer perform duplication control?
9. Define SMTP.
10. What are the groups of HTTP header?

Part-B (5* 16 = 80 Marks)

11. (a) Discuss in detail about Internet Architecture. (16)
Or
(b) What is the need for error detection? Explain with typical examples. Explain methods used for error detection and error correction. (16)

12. (a) Explain in detail about the access method and frame format used in Ethernet and token ring. (16)
Or
(b) (i) Discuss the MAC layer functions of IEEE802.11. (8)
(ii) Briefly define key requirements of wireless LAN. (8)

13. (a) Explain the shortest path algorithm with suitable illustrations. (16)
Or
(b) Explain the distance vector routing algorithm. Mention the limitations of the same. (16)

14. (a) Explain the various fields of the TCP header and the working of the TCP protocol. (16)
Or
(b) (i) Explain the three way handshake protocol to establish the transport level connection. (8)
(ii) List the various congestion control mechanisms. Explain any one in detail. (8)

15. (a) (i) Explain the message transfer using Simple Mail Transfer Protocol. (8)
(ii) Explain the final delivery of email to the end user using POP3. (8)
Or
(b) Write short notes on
(i) Web services (8)
(ii) SNMP (8)

************************







Anna Universtiy BE CSE Eighth Semester Regulation 2004 and 2008 Questions

Anna Universtiy BE CSE Eighth Semester Regulation 2004 and 2008 Questions, Anna University Previous Years Exam Questions, Computer Science and Engineering Question papers



Anna University 
BE/B.Tech CSE Eighth Semester 
Regulation 2004 and 2008

 Click on the links below;












 

Featured Content

Multiple choice questions in Natural Language Processing Home

MCQ in Natural Language Processing, Quiz questions with answers in NLP, Top interview questions in NLP with answers Multiple Choice Que...

All time most popular contents

data recovery