82
Download Previous Year Diploma Paper of Network Security NS 6th Sem CSE/IT/May 2019 Paper
Network Security NS 6th Sem CSE/IT/May 2019 PSBTE Diploma Question Paper
SECTION-A
Q1. Fill in the Blanks. 15×1=15
a. RAID stands for __________________
b. NIDS stands for __________________
c. SSL stands for __________________
d. SMIP stands for __________________
e. IDS stand for __________________
f. IPSEC works in _________ layer of OSI model.
g. A hacker who manually attempts to hack is known as ____________
h. Conversion of plaintext into cipher text is called ______________
i. Firewall may filter the traffic on the basis of _________________
j. _______ is a computer program that can copy itself & infect a computer without permission or knowledge of the user.
SECTION-B
Q2. Attempt any five questions. 5×6=30
i. What are the advantages and need of cyber laws? (2.5, 2.5)
ii. Explain RSA algorithm with example. (5)
iii. What is the difference between symmetric and asymmetric algorithms? (5)
iv. What is access control? Explain the methods to protect computer system.(2,3)
v. Define virus. Explain different types of virus. (2,3)
vi. Explain the concept of Information leakage & Authentication failure. (2,3)
vii. What do you mean by Firewall? Explain the working of firewall in detail. (2,3)
viii. What are the various advantages & disadvantages of NIDS? (5)
SECTION-C
Q3. Attempt any three questions. 3×10=30
a. Define VPN. What are the Services provided by VPN? How to configure VPN? (2,4,4)
b. Define Encryption? Explain various methods of encryption. (2,8)
c. What are IDS? Discuss IDS limitations & Counter measures. (2,3,5)
d. Write short note on: Digital Signature & PGP. (5,5)
e. What is Hacking? Why do hackers’ hacks? Explain different types of Hackers. (2,2,6)
Get Started
RAID stands for __________________
NIDS stands for __________________
SSL stands for __________________
SMIP stands for __________________
IDS stand for __________________
IPSEC works in __________ layer of OSI model.
A hacker who manually attempts to hack is known as ____________
Conversion of plaintext into cipher text is called ______________
Firewall may filter the traffic on the basis of _______________
_______ is a computer program that can copy itself & infect a computer without permission or knowledge of the user.Network Security NS 6th Sem CSE/IT/May 2019 PSBTE Diploma Question Paper Click Here
What are the advantages and need of cyber laws ?Advantages and need of cyber laws
Explain RSA algorithm with example.RSA algorithm with example.
What is the difference between symmetric and asymmetric algorithms?Difference between symmetric and asymmetric algorithms
What is access control? Explain the methods to protect computer system.Access control and methods to protect computer system.
Define virus. Explain different types of virus.Virus and different types of virus.
Explain the concept of Information leakage & Authentication failure.Concept of Information leakage & Authentication failure.
What do you mean by Firewall? Explain the working of firewall in detail.Firewall and working of firewall in detail.
What are the various advantages & disadvantages of NIDS?Advantages & disadvantages of NIDS?
Network Security NS 6th Sem CSE/IT/May 2019 PSBTE Diploma Question Paper Click Here
Network Security CSE/IT/May 2019 Diploma Paper
Get Started
https://www.youtube.com/watch?v=UHX6f8TIvX8https://www.youtube.com/watch?v=M_RR6LVICp0https://www.youtube.com/watch?v=mV41CMWonN4https://www.youtube.com/watch?v=s0LVPE0Q3LE&list=PLA9Q9SDZ781WXNAWit379A4CRLMvjGiUw&index=14&t=0s
Define VPN. What are the Services provided by VPN? How to configure VPN?VPN and Services provided by VPN.
How to configure VPN
Define Encryption? Explain various methods of encryption.Encryption and various methods of encryption.
What are IDS? Discuss IDS limitations & Counter measures.IDS and IDS limitations & Counter measures.
Write short note on: Digital Signature & PGP. Digital Signature & PGP.
What is Hacking? Why do hackers’ hacks? Explain different types of Hackers. Hacking and Why do hackers’ hacks
Explain different types of Hackers.
MY YOUTUBE CHANNEL
JK Smart Classes Upload Lecture for Degree classes like B.TECH,M.TECH in any stream like ECE,EE,ME and Civil Engineering

JK SMART CLASSES
ER.JASWINDER KUMAR

JK SMART LECTURE
ER.JASWINDER KUMAR
Engineering Classes Upload Lecture for Polytechnic Diploma classes in any stream like ECE,EE,ME and Civil Engineering

ENGINEERING CLASSES
ER.JASWINDER KUMAR

er.jaswinder kumar
Senior Lecturer