Anda di halaman 1dari 2

_ 2012/2013 : : .

: Network Security : 2231/ / : 2 : Answer any 4 questions


1# (a) What are the five protections provided by Cryptography? (b) Select the correct answers; (i) Which of the following is a protection provided by hashing? a. confidentiality b. integrity c. availability d. authenticity e. padding (ii) Symmetric cryptographic algorithms are also called ..? a. cipherkey cryptography b. public/private key cryptography c. public key cryptography d. private key cryptography (iii) Which of the following is an asymmetric cryptographic algorithm? a. RSA b. MD5 c. SHA2 d. Diffie_Heuman e. AES f. Whirlpool 2# (a) What is the Padding as used in the Message Digest (MD) algorithm? (b) What do you mean by Script Kiddies? 3# (a) What are the categories of attackers peoples? List them and define any one? (b) Describe the Transposition cipher? Given the key aden city , encrypt the massage:

the exam is very easy but we have to answer correctly


4# (a) List the requirements to be satisfied by Hash function? (b) What do you mean by Spam? 5# (a) How to differentiate between: virus, and trojan-horse? (b) What do you mean by (i) Integrity, (ii) Non Repudiation? 6# (a) Explain by using only a neat sketch, how the following security service is achieved: Data Integrity and Authentication and Confidentiality (b) How to differentiate between: Worm, and Spy-ware?

_ 2012/2013 : : . : Network Security : 2231/ / : 2 : Answer any 4 questions

1# (a) What do you mean by (i) Hackers (ii) Spam (b) Explain by using only a neat sketch, how the Confidentiality service is achieved? 2# (a) What are the difficulties in defending against attacks? (b) Define: (i) Information Security, and (ii) Cryptography,

3# (a) Which of the following are HASH algorithms? DES, MD2, MD9, SHA2, AES, SHA4, RSA. (b) What is the list of requirement to be satisfied by one-way Hash function? 4# (a) What are the three primary objectives of malwares? (b) What are the Malwares for profit? 5# (a) Explain by using only a neat sketch, how the following security service is achieved: Data Integrity and Authentication (b) What are the different between the Virus and the Worm? 6# (a) What is the Private key encryption technique? (b) Describe the Mono_alphabetic and homo_alphabetic Substitution cipher?