Vous êtes sur la page 1sur 2

15EC835

Visvesvaraya Technological University, Belagavi


MODEL QUESTION PAPER I
8 th Semester, B.E (CBCS) EC/TC
Course: 15EC835- CYBER AND NETWORK SECURITY

1 a Discuss the various types of threats faced when using the Internet. Also discuss the 8M
web traffic security approaches.

b Explain TLS protocol stack. 8M

OR

2 a Explain TLS record protocol stack. 8M

b Explain different phases in Handshake protocol in TLS Architecture. 8M

3 a Explain with neat diagram Internet mail Architecture. 8M

b Write a note on the protocols used in E mail architecture. 8M

OR

4 a Explain DMARC functional flow 8M

b Explain DKIM deployment 8M

5 a Explain IP traffic processing for outbound packets. 8M

b Explain various combination of SA associated with IPSec. 8M

OR

6 a Explain IPSec policy Architecture. 8M

b Explain Anti-reply service in IPSec. 8M

1 of 2
15EC835

7 a Define Anti-pattern. Tabulate the differences between signature based malware 8M


detection and polymorphic threats.
b Explain contents of Cyber Anti-pattern templates 8M

OR

8 a Explain the concept of Anti-pattern. 8M

b Explain Cyber anti-pattern catalogue Can’t Patch Dumb and Unpatched application 8M

9 a Explain Zachman Framework for Enterprise Architecture 12M

b Tabulate the differences between primitive and composite models 4M

OR

10 a Explain policies for network security administrator. 8M

b Discuss the methods of providing system protection against Malwares. 8M

2 0f 2

Vous aimerez peut-être aussi