CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE JAN2016 ASSESSMENT_CODE MCA5042_JAN2016 QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297063 QUESTION_TEXT Explain RSA algorithm in detail. RSA algorithm: Different steps are: i) Key generation ii) Encryption iii) Decryption SCHEME OF EVALUATION Explanation required (6+2+2=10 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297066 QUESTION_TEXT What is WAP? Discuss various security services of WAP. Definition of WAP: ------------ 3 marks Services: i) SCHEME OF EVALUATION ii) Cryptographic Libraries Authentication iii) Identity iv) PKI v) Secure Transport vi) Secure bearer Explanation required (7 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297067 QUESTION_TEXT Explain the various security services as recommended by X.800. Each service carries 2 marks SCHEME OF EVALUATION Authentication Access control Data confidentiality Data integrity Non repudiation QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297070 QUESTION_TEXT Explain the various categories of active attacks. Each category explanation carries 2 ½ marks SCHEME OF EVALUATION Masquerade Message replay Message modification Denial of service QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297071 QUESTION_TEXT Explain the elements of active firewall. SCHEME OF EVALUATION Integration module – 2 marks Analysis module – 1 mark Decision module – 2 marks Processing module for security related events – 1 mark Authentication module – 1 mark Ruleset - 1 mark Log book – 1 mark Security management system – 1 mark QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 297074 QUESTION_TEXT Explain any five applications and benefits of IPSec. ● Secure branch office connectivity over the internet ● Secure remote access over the internet ● Establishing extranet and intranet connectivity with partners ● Enhancing electronic commerce security SCHEME OF EVALUATION Applications – 5 marks Benefits – 5 marks ● It provides strong security that can be applied to all traffic crossing the perimeter ● IP It is resistant to bypass if all traffic from the outside must use ● Is below the transport layer and so is transparent to applications ● Can be transparent to end users ● Can provide security for individual users if needed