Phone:+91-88823 09876

Information Security solved assignment Msc IT 3rd sem Amity

Body: 

Information Security Assignment

  1. A Q1.) Explain the Network Role-Based Security for E-mails, Proxy Servers, DNS Servers, Web Servers and Credit Card Security.
  2. Q2.) Describe the criteria required for Security Policy Development to improve the security architecture.
  3. Q3.) Give the answer for following questions: a) Explain the Network Security Model with neat and clean diagram. b) Describe the impacts of Active Attack and Passive Attack over wireless network.
  4. Q4.) Discuss the impacts of Viruses & Worms to generate malicious code as an attack for Information Security.
  5. Q5.) Give the answer for following questions:
  6. a) Describe the role of Virtual Private Network Security in wireless data communication.
  7. b) Explain the Authentication and Authorization Controls for physical security.
  8.  
  9.                                                          Assignment B
  10. Q.1 Numerical Problem Discuss Hill Cipher Encryption Technique in Cryptography. Using Hill Cipher Technique, encrypt the plaintext "AFRICA”, if encryption key is given as Q2). Give the answer for following questions:
  11. a) Describe the physical intrusion detection techniques for access control
  12. . b) Explain the role of Kerberos as an authorization technique to enhance Information Security.
  13. Q3). Discuss the current security threats for Information Security. How can you protect your network from such threats?
  14. Q4). Give the answer for following questions: a) Explain the IT laws which are affecting information security professional.
  15. b) Describe the role of Firewall in Network Security Architecture. Assignment C 1. Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction is called a) Network Security b) Information Security c) System Security d) None of these 2. The nature of eavesdropping on, or monitoring of, transmissions comes under the category of a) Active Attack b) Passive Attack c) Simple Attack d) None of these 3. If an unauthorized party gains access to the system and inserts false objects into it, this is called as a) Interruption b) Modification c) Fabrication d) Interception 4. Which service is concerned with assuring that a communication is authentic? a) Data Integrity b) Non Repudiation c) Confidentiality d) Authentication 5. The science of devising methods that allow information to be sent in a secure form in such a way that the only person able to retrieve this information is the intended recipient is called a) Cryptography b) Steganography c) Bibliography d) None of these 6. Which type of cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. a) Public Key Cryptography b) Simple Cryptography c) Symmetric Key Cryptography d) None of these 7. In which principle, the message is broken into blocks, each of which is then encrypted i.e. like a substitution on very big characters - 64-bits or more? a) Block Cipher Principle b) Stream Cipher Principle c) Confusion & Diffusion Principle d) None of these 8. The Claude Shannon theoretically introduced the following principles that should be followed to design se-cure cryptographic systems. a) Block Cipher Principle b) Stream Cipher Principle c) Confusion & Diffusion Principle d) None of these 9. Which algorithm was developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) for the protection of sensitive, unclassified electronic government data? a) DES b) Triple DES c) AES d) RSA 10. Which algorithm uses a 64 bit key as input? Out of the 64 bits every 8th bit is ignored and only 56 bits are used. a) DES b) Triple DES c) AES d) RSA 11. Which algorithm describes the use of three keys in the following encryption and decryption process? C = EK3 [DK2 (EK1 (P))] P = DK3 [EK2 (DK1(C))] a) DES b) Triple DES c) AES d) RSA 12. Which mode of operation describes the process of encrypting each of these blocks, and generally uses randomization based on an additional input value, called as initialization vector? a) Symmetric Cipher Mode b) String Cipher Mode c) Block Cipher Mode d) None of these 13. Two integers a and b are said to be congruent modulo n, if a) mod nba b) modbna c) mod nab d) None of these 14. Two numbers are said to be relatively prime to each other if there is no factor common between them other than a) 1 b) 2 c) 3 d) 0 15. Which theorem states that if ‘p’ is a prime number and ‘a’ is a positive integer not divisible by p, then ap-1 1 mod p a) Fermat’s Principle b) Chinese Remainder Theorem c) Euclidian Theorem d) Euler’s Theorem 16. Which algorithm describes that for every a and n that are relatively prime as ? a) Fermat’s Principle b) Chinese Remainder Theorem c) Euclidian Theorem d) Euler’s Theorem 17. In which encryption each communicating party generates a pair of keys? a) Public Key Encryption b) Symmetric Key Encryption c) Private Key Encryption d) None of these 18. Authentication refers to the genuineness of the communicating entities. For example if A and B are communicating, both A and B should be aware of each other’s a) Identity b) Network c) Application d) None of these 19. The process of verifying the integrity and authenticity of transmitted messages is called a) Message Authentication b) Message Integrity c) Message Inspection d) None of these 20. The message authentication function includes a) Message Encryption b) MAC c) Hash Function d) All of the above 21. Which version of hash function chosen in a public review process from non-government designers? a) SHA-0 b) SHA-1 c) SHA-2 d) SHA-3 22. Which version of message-digest algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input? a) MD2 b) MD4 c) MD5 d) None of these 23. Which attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory? a) Brute Force Attack b) Birthday Attack c) Cryptanalysis d) None of these 24. Which scheme typically consists of three algorithms as key generation, signing algorithm and signature verification? a) Digital Signature b) MD5 c) RSA d) SHA 25. Which management has two main aspects of distribution of public keys and use of public key encryption to distribute secret keys? a) Key Management b) Protocol Management c) Distribution Management d) None of these 26. Which certificates allow key exchange without real time access to public key authority? a) Public Key Certificates b) Private Key Certificates c) Digital Certificates d) All of the above 27. The 1st published public-key algorithm was invented by Whitfield Diffie and Martin Hellman in 1976. Which name was referred to this algorithm? a) Whitfield-Martin key exchange b) Diffie-Hellman key sharing c) Whitfield-Martin key generation d) Diffie-Hellman key exchange. 28. Which key is associated with the identity contained in the X.509 certificate? a) Private Key b) Public Key c) Symmetric Key d) None of these 29. Which is a security architecture that has been introduced to provide an increased level of confidence for exchanging information over an increasingly insecure Internet? a) PKI b) Digital Signature c) X.509 d) None of these 30. Which protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection? a) Kerberos b) PGP c) MIME d) None of these 31. Which authentication protocol was developed by Phil Zimmerman, who developed this encryption system for humanitarian reasons? a) Kerberos b) PGP c) MIME d) S/MIME 32. Which protocol provides the cryptographic security services for electronic messaging applications? a) Kerberos b) PGP c) MIME d) S/MIME 33. Which member of IPSec protocol suite provides connectionless integrity and data origin authentication for IP datagram and provides protection against replay attacks? a) Authentication Headers (AH) b) Encapsulating Security Payloads (ESP) c) Security Associations (SA) d) None of these 34. Which protocol was originally developed by Netscape, to ensure security of data transported and routed through HTTP, LDAP or POP3 application layers? a) Authentication Headers (AH) b) Encapsulating Security Payloads (ESP) c) Security Associations (SA) d) Secure Socket Layer (SSL) 35. Which protocol is used to initiate a session between the server and the client? a) SSL b) Handshake Protocol c) ESP d) None of these 36. Which protocol has the potential to emerge as a dominant force in the securing of electronic transactions? a) Digital Signature b) SSL c) ESP d) Secure Electronic Transactions (SET) 37. Which security mechanisms of a system are designed to prevent unauthorized access to system resources and data? a) IDS b) Firewall c) Antivirus Software d) None of these 38. Which software is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks? a) Malicious Software b) Freeware c) Antivirus d) Firewall 39. Which security mechanism protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service? a) Firewall b) Antivirus c) Honeypot d) IDS 40. Which law touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace? a) IT Law b) IT Act c) Cyber Law d) None of these

 

Title:
Information Security solved assignment Msc IT 3rd sem Amity (Customize)
Short Name or Subject Code:  Click to view question
Short Description:  Y
University:  Amity
Select Type: 
Service Type:  Assignments
Select Semester:  Semester- III Select Cource:  Msc-IT
commerce line item type: 
Price: 
₹500.00
Product: