#1
| |||
| |||
![]()
Dear Sir I am a student of Mumbai University MCA and my exams is so close and I am preparing for the exam but I have no idea about the question paper so please can you give me the question paper and tell me from where I can download the question paper?
|
#5
| ||||
| ||||
![]()
Here I am giving you question paper master of computer application course offered by Mumbai university with it .. 1. Explain the objectives of SET protocol 2. Write in detail about the process involved in SET protocol 3. Give a sample SET session and explain each step involved in detail 4. Wrtie a short note on SSL protocol 5. Define the following a) Alert protocol b) Record protocol c) Handshake protocol 1. Write a short note on Network management security . 2. Define the following a) SMTP b) PGP c) PEM 3. Write in deail about the Email security mechnism 4. Explain the need for Mangemnt Information Base 5. Write in detail about SNMP 1. Write a short note on Kerberos 2. What are the various types of Kerberos 3. Explain the concept of interrealm authentication with Kerberos 4. Give an example for the Kerberos system. 5. What are the various types of tickets with Kerberos V5. 6. Explain about the various keys used with Kerberos. 1. Explain the role of intruders 2. Discuss about the structure of virus 3. What are the various types of virus 4. Why do we need firewall 5. Explain the advantages of firewalls 6. What are the limitations of firewalls 7. Why do we need intrusion detection system 8. What are the various types of IDS 9. What are the various intrusion techniques 1) What is the classification of attacks? Compare and contrast both the types. 2) Explain about active attacks in detail. 3) Explain about passive attacks in detail. 4) What are the variations of Dos attack? Explain them. 5) Explain about DDoS attacks. How zombies can be used to create DDos? 6) Explain the practical side of attacks in detail. 7) State how cookies can be harmful to system? 8) Compare security services and service mechanisms. 9) Explain about “Challenge-Response Authentication” mechanism. 10) What are the principles of security? Explain. 11) What is integrity check? How can it be implemented? Explain. 12) Define salting process. 13) What is Skey? How can it be used as a security measure? 14) Explain how authentication service can be implemented? List the protocols used for authentication. 15) Define Hash Function briefly. 16) Explain Denial of Service attack? How can this attack be carried out on a internet enabled networked system? 17) What are the differences between “Packet sniffing” and “Packet spoofing”? 18) You are assigned a job of system administrator of a company. Explain how will you try to secure your own network from the following agents that pose a threat to the security: 1) Worms 2) Hackers 3) Cookies 4) Employees Contact details : Mumbai University Vidyapeeth Vidyarthi Bhavan, B Rd, Churchgate, Mumbai, Maharashtra 022 2265 2819
__________________ Answered By StudyChaCha Member |