Network Security Past Paper of SAK

Paper consists of 3 sections:

section 1: (20 marks)

Q1: given 32 bit hex value, pass it through E/P table. E/P table was not given.

Q2: RSA algorithm. e = 7, p = 5, q = 11. Message in binary = (1000), find plain-text, cipher-text, d, z

Q3: Given 64 bit hex value, pass it through IP table, IP table was given.

section 2: (26 marks)

– configuration of pvlan with example.

– difference between MAC and one way. Hash value

– explain briefly working of ipsec AH and ESP in tunnel and transport mode. support AH in transport and tunnel mode.

– briefly explain the making of digital signature.

– differentiate the following.

– confusion and diffusion

– private key authority and private key certificate

– circuit level gateway and application level gateway firewall

(few more questions,,, i don’t remember..)

section 3: (16 marks)

14 mcq’s, 2 fill in the blanks

NOTE: Major part of the paper was from IPSEC.

Q no 1.

given input of binary number : 00001111101010100

32 bit in DEs passing from E/p table

Q no 1 a

input :11223344556677

in hexadecimail PASsing from PC-1 given TABLe !

Q no 2.

Digital signature ?? Explain

Q no. 3

RSA LAB Question , n=55 , p=5, q =11, E= 7

message M =(1000) in binary convert into Ciper txt

Q no 4,

difference b/w

Tunnel mode and transparent mode

Q

no 5.

difference b/w MAC and IPsec

Q no 6

breifly explain about

a.message authentication

tunnel mode

ipsec .

Qno 8

configure PVLAN of its step with example .

Q no 9

MCQ of 20 marks

protected ports . pvlan, MD5 ,RSA , IPSEC ,

DCN Paper 2: 2010

Q1) Write Benefits fo VLAN and VPN
Q2) Explain the ICMP error message
i) Destination unreachable ii) Redirect
iii)Fragmentation iv) Router found
Q3) Difference between RARP and inverse ARP
Q4) Function of ARP and operator in ARP
Q5) CIDR in IPv6
Q6) Different Timer in TCP
Q7) Difference between DCE and DTE
Q8) Layers of X.25? DoD model
Q9) Advantages and Disadvantages of ATM
Q10) Size of Packet in circuit switching
Q11) QoS and flow control in IPv6
Q12) Purpose of Multiple header
Q13) Is Apple talk and IPx support DHCP
Q14) What is DHCP and BootP
Q15) SA( asa koi question tha)
Q16) Difference between channel and Comman channel identifier
Q17) What is PDN
Q18) What is HDLC
Q19) Difference Between Switching and Routing

You should also include qustions that are in your paper thank

Important Qustions for ICS II

Q1: Write “C” code for sorting the data in my_list using Bucket sort algorithm and printing it in the same function. Use the following struct definition and prototype of the function (the function will be called as bucket_sort(&my_list))
typedef struct LIST_TYPE
{ int info[MAX];
int current_sixe; };
void bucket_sort(LIST_TYPE *list);

Note: MAX is a predefined constant integer and my_list.current_size = 1000)

Q2: Define the following
1) syntax 2) semantics 3) metalanguage 4) Terminal symbol
5) Non terminal symbol 6) Data Structure 7) ADT
8) linked list 9) Tree data structure 10) Grammer

Q3: What is meant by generations of programming languages? Explain with example(S).

Q4: Describe the overview of the process of developing an expert system.

Q5: Find complexity of the following code of C language written to multiply the two matrices stored in two 2D arrays a and b the matrix is of the order of rowsA * colsA, whereas order of matrix b is rowsB* colsB.

Q6: Difference between following
1) Mealy machine and Moore Machine
2) Finite state machine and finite state automation
Q7: Convert the following list of alphabets in inserted Inorder into an empty binary search tree
J,R,D,G,T,E,M,P,A,Q,
a) draw the final binary tree
b) find the preorder, postorder, Inorder Traversal of the tree.

Q8:Which sorting algo is better than binary search and write its code.

Q9: Blanks
1) Resolution of eye________
2) __________ list have previous node and next node address.
3) the function called itself called________