Sample Paper on Information System & Securities

Apr 8 • Engineering Sample Papers • 3100 Views • No Comments on Sample Paper on Information System & Securities

Here we have formulated Sample Paper on Information System & Securities.This sample paper on Information system & Securities helpful for the students of computer science & Engineering.The Notes on Information System & Securities are very important for the semester piont of view.

These are the Unitwise Long answer type questions that is very important for semester.


Information System and Security Question Bank

Information System and Security Sample Paper


1.(a)What is encryption and decryption?draw the block diagram showing plain text,ciphertext,encryption and decryption.

(b) Define the term security attack.explain security attacks in detail.


1(a) What is the concept of IDEA?Explain the operation of a round IDEA and compare it with DES.

(b) Explain the different block clipher mode of operation in detail.


2.(a)Differentiate following:
1.Active attack and passive attack
2.Diffusion and confusion

(b)Describe the following transposition techniques with suitable example.
1.Vernam Clipher
2.Simple columnar Transposition Technique


2(a) What is Chinese remainder theorem?explain with example.
(b) Elaborate public key cryptography principle in detail.what are the application of public key cryptography?


3(a) What do you mean by message authentication >explain with message authentication functions.
(b) Explain MDS algorithm.Compare it with SHA.


3. Write short notes on
1.Digital signature signature standards


4.(a)What do you mean by pretty good privacy?explain the working of PGP.
(b) Explain the format of X.509 authentication certificate.


Write short note on:
2. Kerberos


5(a)Explain and compare key exchange algorithm used in IP sec.
(b) With suitable schematic,explain handshake protocol in SST.


Write short note on the following (not more than 75 words)

1.Firewall Design Principles
2.Trusted Systems
3.Types of Viruses
4.Attacks on packet filtering outers.

Questions with Answer on Information System & Securities


Q 1 How do you change your DNS settings in Linux/Windows?
Ans: Here you’re looking for a quick comeback for any position that will involve system administration (see system security). If they don’t know how to change their DNS server in the two most popular operating systems in the world, then you’re likely working with someone very junior or otherwise highly abstracted from the real world.


Q 2 What’s the difference between encoding, encryption, and hashing?
Ans: Encoding is designed to protect the integrity of data as it crosses networks and systems, i.e. to keep its original message upon arriving, and it isn’t primarily a security function. It is easily reversible because the system for encoding is almost necessarily and by definition in wide use. Encryption is designed purely for confidentiality and is reversible only if you have the appropriate key/keys. With hashing the operation is one-way (non-reversible), and the output is of a fixed length that is usually much smaller than the input.


Q 3 What’s the difference between Diffie-Hellman and RSA?
Ans: Diffie-Hellman is a key-exchange protocol, and RSA is an encryption/signing protocol. If they get that far, make sure they can elaborate on the actual difference, which is that one requires you to have key material beforehand (RSA), while the other does not (DH). Blank stares are undesirable.


Q 4 n public-key cryptography you have a public and a private key, and you often perform both encryption and signing functions. Which key is used for which function?
Ans: You encrypt with the other person’s public key, and you sign with your own private. If they confuse the two, don’t put them in charge of your PKI project.


Q 5 How would you build the ultimate botnet?
Ans: Answers here can vary widely; you want to see them cover the basics: encryption, DNS rotation, the use of common protocols, obscuring the heartbeat, the mechanism for providing updates, etc. Again, poor answers are things like, “I don’t make them; I stop them.”

Tell us Your Queries, Suggestions and Feedback

Your email address will not be published.

« »