Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
Critically discuss the issues related to the Domain Name. Critically discuss the importance of Copyrights in Digital media.
Make a distinction between Symmetric and Asymmetric Encryption Systems. Provide the Overview of DES Algorithm.
Write down the headers fields define in MIME? Illustrate the header format for the ISAKMP message. Explain in detail.
Write down the technical deficiencies that are present in the Kerberos version 4 protocols?
Explain stream cipher and block cipher with suitable example.
Which security service isn’t a goal of the cryptographic systems? Why would you not contemplate the employ of One-Time Pad Cipher for large messages?
What is the main difference between virus and worm? What combination of backup strategies offers the fastest backup creation time?
Write down the difference between substitution cipher and transposition cipher.
Describe datagram packets. Write down the advantages of WAN. Describe user Datagram protocol.
Describe in detail the working of the TCP/IP and HTTP protocols.
Consider an elliptic curve encryption or decryption scheme. The cryptosystem parameters are E5(1,6) and G = (2,4). B's secret key is nB = 2.
Consider cryptographic hash functions. Name four necessary properties for a cryptographic hash function, describing for each why it is vital.
Describe the significance of the Euler Totient function in Cryptography. Compute Euler Totient function value, φ(1280).
Consider a Diffie-Hellman scheme with a common prime q = 11 and a primitive root α = 2.
In brief describe the given security goals given by cryptography: confidentiality, integrity, authentication and non-repudiation.
The basic security goals are confidentiality, Integrity and availability (CIA). Explain the issues and problems in achieving these goals.
Which Data Encryption Standard (DES) operating modes can be employed for large messages without the worry that an error early in the encryption or decryption process will spoil results during the co
Briefly describe how the Security Configuration and Analysis Tool (SCAT) snap-in in MMC (Microsoft Management Console) can be employed for securing a computer.
Assess probable difficulties and risks associated with using public infrastructure like the Internet as part of a business solution.
What are the two most important threat faced by the security industry? Describe the privacy issues related to use of Biometrics. Describe the concept of Single Sign on (SSO). Mention merits and demeri
Sketch a possible dual-homed Bastion Host configuration? How is it dissimilar from a single-homed Bastion Host? Illustrate five different types of computer viruses. Determine the most dangerous type a
Outline two advantages of using PERT and CPM for a Project manager. State one major drawback of using these network techniques in network analysis. Write down three distinguishing features between PER
Discuss three applications of operations research in order to improve decision making process. Discuss briefly any two basic components of a queueing system.
Which Network protocols does J2ME supports for establishing connection? What do you mean by Cluster and MIDlet. What is gossip protocol?
Explain how master secret is created from pre-master secret in SSL. Describe the processes of generating digital signature using RSA.