Vous êtes sur la page 1sur 5

My cs707 paper 06-03-06(10:30)

1. Difference between IDS and IPS (5)


2. Main services provided by IPSec (5)
3. Packet Filter Firewall (5)
4. Security vulnerabilities to security system. (10)
5. Briefly describe three goals of firewall. (10)
6. Give an over view of vulnerabilities scanning mechanism. (10)
7. 4 access control lists on switches (15)

707 on 6 March time 8.00am 1.Techniques use to avoid guess able password(10)
2.ACls Traffic on swiches(jo 4 types ki ACLS han)..15 marks.
3.advantage and disadvantages of link encryption(5)
4.what is non mobile malware?(5).
Baki questions bhool gy mujhy

CS707- Today's paper: 4 March 2016 Final Term Paper

1- How would you explain the rationalbe behind the fact that most banks and credits cards
companies allow their customers to access to their accounts rom ATM machines using only 4
digits as personal identification? --------- 10 Marks
2- What is intrusion detection? Give some uses of intrusion detection and prevention system? ----
----10 Marks
3- List and briesfly describe three desing goals for a firewall? ------- 10 Marks
4- What is the difference between statistical anomaly detection and rule-based intrusion
detection? ------ 5 Marks
5- List and briefly define three classes of intruders? ------ 5 Marks
6- Define the concepts of MIME and S/MIME ? ----- 5 Marks
7- Forgotten ???? sorry

My cs707 final term paper <br>


&nbsp;1. Statistical anomaly vs. Rule based intrusion 5<br>
Q. 2 mime vs smime 5<br>
Q. 3 Difference between HTTP and HTTPS 5<br>
Q. 4 risk of application security 10<br>
Q. 5. Steps to establish secure connection by SSH? 15<br>
Q. 6 overview of MIME 15<br>
Q. 7.&nbsp; TYPICAL FW packet fillers <br>

707 paper:-
1) Statistical anomaly detection vs rule based detection
2) Info used by typical packet filtering firewall
3) Diff b/w packet filtering firewall and stateful firewall
4) Explain internal, external and overt techniques
5) Rationale behind the usage of ATM machine for accounts management
6) Limitations of firewalls

Final term CS707 04-03-2016 at 4:30


7 questions each (5 + 5 + 5 +10 + 10 + 10 + 15)
1. Diff between statistical anomaly detection and rule based detection
2. HTTP vs HTTPs
3. Security vulnerabilities to security system and how these are fixed
4. Describe four techniques that firewall use to access control
5. List and describe five techniques to avoid guessable password.
6. Penetration testing
7. What is OWASP and describe its top 10.

My cs707 final term paper


Q. 1. Statistical anomaly vs. Rule based intrusion 5
Q. 2 mime vs smime 5
Q. 3 Difference between HTTP and HTTPS 5
Q. 4 risk of application security 10
Q. 5. Steps to establish secure connection by SSH? 15
Q. 6 overview of MIME 15
Q. 7.TYPICAL FW packet fillers

mine cs718 paper 10:30


no MCQs. total marks=60
1. briefly describe the access code types in Bluetooth? (5)
2. Why IEEE 802.11 cannt support broadband wireless MAN and is needed development of IEEE 802.16?
(5)
3. Descrobe the Tunneling process of Mobile IP?(5)
4. List and explain the types of link which is established between Master ans Slave? (10)
5. Advantages and Disadvantages of Indirect TCP II?(10)
6. DEFINE FOLLOWING TERMS.
a. packet level QoS
b. Circuit level qos
c. channel level qos
d. userlevel qos?
(10)
7. Categorze Handoff types? explain Vertical Handoff process and isues? (15).

My cs718 paper fall2015 final term


Q. 1 ending procedure of pick net
Q. 2 no of nodes in pick net
Q. 3 registration process of Mobile IP
Q. 4 pros n cons of SPIN and direct diffusion
Q. 5 factors effecting reliability in WSN
Q. 6 architectural diagram of WSN
Q. 7 conceptual question networking suggestion

My midterm paper of CS718 @ 10:30am dated 31st Dec,2015

Q1 Difference b/w periodic and aperiodic signal ? 5


Q.2 Call routing in GSM diagram ? 10
Q.3 Write two drawbacks of ALOHA? 5
Q.4 Explain IS-95 reverse link? 5
Q.5 How and why splitting? 5

CS-718 MID TERM 31-12-2015

Q.1. HOW CAN DISTINGUISH BETWEEN BASEBAND SIGNAL AND BANDPASS


SIGNAL.(5)
Q.2.WRITE A BRIEF NOTE ON ENHANCED DATA RATE FOR GSM EVOLUTION
(EDGE) (5)
Q.3 WHICH ISSUES ARE IDENTIFIED WHEN INTERSYSTEM HANDOFF OCCURS? (5)
Q.4. SPECIFY THE CLASSES OF A/Gb MODE IN GPRS? (5)
Q.5. CLASSIFY THE MULTIMEDIA SERVICES BASED ON THE QoS CRITERIA IN
UMTS.? (10)

Today cs707 paper at 8:30am


10 MCQS
1.you are appointed as a network security personnel in an organisation,if u are using the
symmetric key encryption , what will be yours arguments in favour and against the use of this
algorithm?5 marks

2.eleborate the term digital signature?5 marks


3.what is CMAC?how it works?5 mark
4.list and briefly describe the fields that are part of a digital certificates? 10 marks

MY CS718 PAPER
Q1. Call routing in GSM network with Detailed diagram
Q2. Suggest these networks are analog or digital,GSM,GPRS,EDGE,AMPS,TACS
Q.3 Issues regarding handoff in interSystem 5 marks
Q.4 cell splitting vs cell clustering
Q.5 Ad-hoc vs. Cellular network.

27-12-2015 2:30 CS707


10 mcqs
11. what CMAC? How it works
12. List and describe three uses of public key cryptosystem.
13. About Certificates
14. Consider A 32-bit has function implented as two 16-bit functions using XOR and RXOR. Is created
checksum by concatination the both detects all the oddparity errors? Explain. If these functions are used
for authentication what will be the effectiveness of the authentication.

Cs 718 mid term fall 2015 23_12,15


Q1. QoS of GPRS BEARER 5marks
Q2. QOS multimedia UMTS 10 MARKS
Q.3 analog vs digital signal 5 marks
Q.4 cell splitting vs cell clustering
Q.5 HSCSD

cs707 paper today


10 MCQs
3 questions of 5 marks
1. question of 10 marks
q.1 whar r the charcterstics of strong streamb cipher
q 2. CBC-MAc drescibe its properties.
q 3. public key cryptography 3 uses
q4. define and describe the fields if digital certificate. 10 marks

Network security paper CS707 mid term paper

Short Questions (5 marks each)


1. What is the difference between active attacks and passive attacks.
2. In context of hashing what is meant by compression.
3. What is X509 (I forgot the actual number) standard?
4. What are one way functions? How they are implemented in cryptography?
Long Questions (10 marks each)
1. What security measures are adopted in the layers of OSI model.
2. Define and discuss various components of PKI infrastructure.

Vous aimerez peut-être aussi