85

Download Previous Year Diploma Paper of Network Security NS 6th Sem CSE/IT/Dec 2018 Paper

Network Security NS 6th Sem CSE/IT/Dec 2018 PSBTE Diploma Question Paper

                                                SECTION-A

     Q1. a) Expand the following acronyms.            10×1.5=15

       i. VPN
      ii. RAID
     iii. IDS
     iv. TCP
      v. PGP

     b) Fill in the blanks.

      vi. __________ protocol is similar to SSL.
     vii. Conversion of plain text into cipher text is called an ____________ .
     viii. _____________ is the most common authentication mechanism.
       ix. Firewall is a specialized form of a ____________________ .
        x. LAN stands for ________________________ .

                                      SECTION-B

Q2. Attempt any five questions.                                                                    5×6=30

    a. What is the need for Cyber Law?
    b. What is Digital Signature?
    c. How secure conversation is done through public key cryptography?
    d. What is Trojan horse? What is the principal behind it?
    e. What is Denial of Services attack?
    f. What are different types of Hackers?
    g. What do you mean by Network Security?
    h. What is Encryption and Decryption?

                                     SECTION-C

Q3. Attempt any three questions.                                                       3×10=30

       i. Write short notes the following. (any two)
         a. Digital Signature
         b. Data Encryption Standard
         c. RSA Encryption
      ii. What are technical aspects of Cyber Law Indian perspectives (IT Act 2000)
     iii. What is cryptography? Explain various types of algorithms for                                    cryptography. Differentiate between Symmetric and asymmetric                                algorithm.
     iv. What is Computer Virus? Explain different types of viruses in detail.
      v. What is Intrusion Detection System? Explain various types of IDS in detail.

Network Security NS 6th Sem CSE/IT/DEC 2018 PSBTE Diploma Question Paper

Get Started

Section a Network Security CSE/IT/DEC 2018 Diploma Paper              

VPN stands for __________________

 VPN

RAID stands for __________________

RAID

IDS stands for __________________

IDS

TCP stands for __________________

TCP

PGP stand for __________________

PGP

 __________ protocol is similar to SSL. Conversion of plain text into cipher text is called an ____________ . _____________ is the most common authentication mechanism. Firewall is a specialized form of a ____________________ . LAN stands for ________________________ .
Network Security NS 6th Sem CSE/IT/DEC 2018 PSBTE Diploma Question Paper Click Here

Section B :Network Security NS 6th Sem CSE/IT/DEC 2018 PSBTE Diploma Question Paper              

What is the need for Cyber Law?

Need for Cyber Law

What is Digital Signature?

 Digital Signature

How secure conversation is done through public key cryptography?

How secure conversation is done through public key cryptography

 What is Trojan horse? What is the principal behind it?

Trojan horse and principal behind it

What is Denial of Services attack?

 Denial of Services attack

What are different types of Hackers?

Different types of Hackers

What do you mean by Network Security?

Network Security

What is Encryption and Decryption?

Encryption and Decryption?

Network Security NS 6th Sem CSE/IT/May 2018 PSBTE Diploma Question Paper Click Here

Network Security CSE/IT/May 2018 Diploma Paper

Get Started https://www.youtube.com/watch?v=UHX6f8TIvX8https://www.youtube.com/watch?v=M_RR6LVICp0https://www.youtube.com/watch?v=mV41CMWonN4https://www.youtube.com/watch?v=s0LVPE0Q3LE&list=PLA9Q9SDZ781WXNAWit379A4CRLMvjGiUw&index=14&t=0s

Section c :-Network Security CSE/IT/DEC 2018 Diploma Paper

Write short notes the a. Digital Signature

Short notes the a. Digital Signature

b. Data Encryption Standard

Data Encryption Standard

c. RSA Encryption

RSA Encryption

What are technical aspects of Cyber Law Indian perspectives (IT Act 2000)

Technical aspects of Cyber Law Indian perspectives (IT Act 2000)

What is cryptography? Explain various types of algorithms for cryptography. Differentiate between Symmetric and asymmetric algorithm.

Cryptography and various types of algorithms for cryptography.

Differentiate between Symmetric and asymmetric algorithm.

What is Computer Virus? Explain different types of viruses in detail.

Computer Virus and different types of viruses in detail.

What is Intrusion Detection System? Explain various types of IDS in detail.

Intrusion Detection System and various types of IDS

Network Security NS 6th Sem CSE/IT/May 2019 PSBTE Diploma Question Paper Contact Us
MY YOUTUBE CHANNEL
JK Smart Classes Upload Lecture for Degree classes like B.TECH,M.TECH in any stream like ECE,EE,ME and Civil Engineering \"JK JK SMART CLASSES ER.JASWINDER KUMAR \"JK JK SMART LECTURE ER.JASWINDER KUMAR Engineering Classes Upload Lecture for Polytechnic Diploma classes in any stream like ECE,EE,ME and Civil Engineering \"JK ENGINEERING CLASSES ER.JASWINDER KUMAR \"JK er.jaswinder kumar Senior Lecturer
Scroll to Top