Вы находитесь на странице: 1из 2

Answer all questions. Each question carries 4 marks. 1. Define confidentiality. 2.

Discuss the need for a secure socket layer. 3. Dis'cuss about secure FTP. 4. What are the special needs for protection in a distributed 5. Explain the concepts of Database Security. 6. Define Authentication 7. What is a Digital Signature? and the need for Authentication. computer environment?

www.qpaper.in
Answer all questions. Each question carries 12 marks.

8. What are Trusted Networks? 9. Compare viruses and worms. 10. Unix uses 2 files associated with password. Explain them.

11. (a) Define Hacking. Describe all its tools. (b) Explain the basics of password protection. Or 12. Discuss about the security needs in Distributed systems and centralised systems. 13. (a) In a Public key system using RSA, cipher text C n = 35. Find M.

(6 marks) (6 marks)

10 is sent to user whose public key e = 5, (7 marks) (5 marks)

Or 14. Explain in detail about the Data Encryption standards.

15. (a) Explain the different Authentication .(b) Discuss the need for Authentication

Protocols. in e-Commerce applications. Or

(6 marks) (6 marks)

16. Explain the need for program security. Discuss its implementation 17. Discuss any two firewall models for a WAN.

in a multi-user system.

18. (a) Explain the features of SSL.

www.qpaper.in
Or

(7 marks) (5 marks)

(b) Transport layer is secured using SSL. Justify. 19. Explain the facilities available to provide security, while writing queries in SQL.

Or
20. (a) Discuss about secure FTP. (b) What is a secure procedure call. (6 marks) (6 marks) [5 x 12 = 60 marks]

Вам также может понравиться