CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

advertisement
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
JAN2016
ASSESSMENT_CODE MCA5042_JAN2016
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297063
QUESTION_TEXT
Explain RSA algorithm in detail.
RSA algorithm:
Different steps are:
i)
Key generation
ii)
Encryption
iii)
Decryption
SCHEME OF EVALUATION
Explanation required (6+2+2=10 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297066
QUESTION_TEXT
What is WAP? Discuss various security services of WAP.
Definition of WAP:
------------ 3 marks
Services:
i)
SCHEME OF EVALUATION ii)
Cryptographic Libraries
Authentication
iii)
Identity
iv)
PKI
v)
Secure Transport
vi)
Secure bearer
Explanation required (7 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297067
QUESTION_TEXT
Explain the various security services as recommended by
X.800.
Each service carries 2 marks
SCHEME OF
EVALUATION

Authentication

Access control

Data confidentiality

Data integrity

Non repudiation
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297070
QUESTION_TEXT
Explain the various categories of active attacks.
Each category explanation carries 2 ½ marks

SCHEME OF EVALUATION 
Masquerade
Message replay

Message modification

Denial of service
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297071
QUESTION_TEXT
Explain the elements of active firewall.
SCHEME OF EVALUATION

Integration module – 2 marks

Analysis module – 1 mark

Decision module – 2 marks

Processing module for security related events – 1 mark

Authentication module – 1 mark

Ruleset - 1 mark

Log book – 1 mark

Security management system – 1 mark
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
297074
QUESTION_TEXT
Explain any five applications and benefits of IPSec.

●
Secure branch office connectivity over the internet
●
Secure remote access over the internet
●
Establishing extranet and intranet connectivity with partners
●
Enhancing electronic commerce security

SCHEME OF
EVALUATION
Applications – 5 marks
Benefits – 5 marks
●
It provides strong security that can be applied to all traffic
crossing the perimeter
●
IP
It is resistant to bypass if all traffic from the outside must use
●
Is below the transport layer and so is transparent to
applications
●
Can be transparent to end users
●
Can provide security for individual users if needed
Download