Download Previous Year Diploma Paper of Network Security NS 6th Sem CSE/IT/Dec 2018 Paper
Network Security NS 6th Sem CSE/IT/Dec 2018 PSBTE Diploma Question Paper
                        SECTION-A
   Q1. a) Expand the following acronyms.      10×1.5=15
    i. VPN
   ii. RAID
   iii. IDS
   iv. TCP
   v. PGP
   b) Fill in the blanks.
   vi. __________ protocol is similar to SSL.
   vii. Conversion of plain text into cipher text is called an ____________ .
   viii. _____________ is the most common authentication mechanism.
    ix. Firewall is a specialized form of a ____________________ .
    x. LAN stands for ________________________ .
                   SECTION-B
Q2. Attempt any five questions.                                  5×6=30
  a. What is the need for Cyber Law?
  b. What is Digital Signature?
  c. How secure conversation is done through public key cryptography?
  d. What is Trojan horse? What is the principal behind it?
  e. What is Denial of Services attack?
  f. What are different types of Hackers?
  g. What do you mean by Network Security?
  h. What is Encryption and Decryption?
                   SECTION-C
Q3. Attempt any three questions.                            3×10=30
    i. Write short notes the following. (any two)
     a. Digital Signature
     b. Data Encryption Standard
     c. RSA Encryption
   ii. What are technical aspects of Cyber Law Indian perspectives (IT Act 2000)
   iii. What is cryptography? Explain various types of algorithms for                  cryptography. Differentiate between Symmetric and asymmetric                algorithm.
   iv. What is Computer Virus? Explain different types of viruses in detail.
   v. What is Intrusion Detection System? Explain various types of IDS in detail.
Need for Cyber Law
 Digital Signature
How secure conversation is done through public key cryptography
Trojan horse and principal behind it
 Denial of Services attack
Different types of Hackers
Network Security
Encryption and Decryption?
Network Security NS 6th Sem CSE/IT/May 2018 PSBTE Diploma Question Paper Click Here
Short notes the a. Digital Signature
Data Encryption Standard
RSA Encryption
Technical aspects of Cyber Law Indian perspectives (IT Act 2000)
Cryptography and various types of algorithms for cryptography.
Differentiate between Symmetric and asymmetric algorithm.
Computer Virus and different types of viruses in detail.
Intrusion Detection System and various types of IDS
Network Security NS 6th Sem CSE/IT/May 2019 PSBTE Diploma Question Paper Contact Us
MY YOUTUBE CHANNEL
JK Smart Classes Upload Lecture for Degree classes like B.TECH,M.TECH in any stream like ECE,EE,ME and Civil Engineering
JK SMART CLASSES
ER.JASWINDER KUMAR
JK SMART LECTURE
ER.JASWINDER KUMAR
Engineering Classes Upload Lecture for Polytechnic Diploma classes in any stream like ECE,EE,ME and Civil Engineering
ENGINEERING CLASSES
ER.JASWINDER KUMAR
er.jaswinder kumar
Senior Lecturer