image

Solution of Assignment Synopsis & Project Dissertation Report


Note: ⇩    Fill the Name, Email and Mobile to get unlock the priclist...!!!!

PRODUCT DETAILS

Online-Typing-and-Filling

Title Name Amity Solved Assignment MSC IT 3rd Sem for Information Security
University AMITY
Service Type Assignment
Course Msc-IT
Semester Semester-III Course: Msc-IT
Short Name or Subject Code Information Security
Commerce line item Type Semester-III Course: Msc-IT
Product Assignment of Msc-IT Semester-III (AMITY)
Price

PRICE INR

Click to View Price

Solved Assignment


  Questions :-

                                                                                                  Information Security

Assignment A

Q1.) Explain the Network Role-Based Security for E-mails, Proxy Servers, DNS Servers, Web Servers and Credit Card Security.

Q2.) Describe the criteria required for Security Policy Development to improve the security architecture.

Q3.) Give the answer for following questions:

  1. Explain the Network Security Model with neat and clean diagram.
  2. Describe the impacts of Active Attack and Passive Attack over wireless network.

Q4.) Discuss the impacts of Viruses & Worms to generate malicious code as an attack for Information Security.

Q5.) Give the answer for following questions:

  1. Describe the role of Virtual Private Network Security in wireless data
  2. Explain the Authentication and Authorization Controls for physical security.

 

 

Assignment B

Q.1 Numerical Problem

Discuss Hill Cipher Encryption Technique in Cryptography. Using Hill Cipher Technique, encrypt the plaintext "AFRICA”, if encryption key is given as                                            

Q2). Give the answer for following questions:

  1. Describe the physical intrusion detection techniques for access control.
  2. Explain the role of Kerberos as an authorization technique to enhance Information Security.

Q3). Discuss the current security threats for Information Security. How can you protect your network from such threats?

Q4). Give the answer for following questions:

  1. Explain the IT laws which are affecting information security professional.
  2. Describe the role of Firewall in Network Security Architecture.

 

 

Assignment C

  1. Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction is called

a) Network Security

b) Information Security

c) System Security

d) None of these

 

 

  1. The nature of eavesdropping on, or monitoring of, transmissions comes under the category of

a) Active Attack

b) Passive Attack

c) Simple Attack

d) None of these

 

 

  1. If an unauthorized party gains access to the system and inserts false objects into it, this is called as

a) Interruption

b) Modification

c) Fabrication

d) Interception

 

 

  1. Which service is concerned with assuring that a communication is authentic?

a) Data Integrity

b) Non Repudiation

c) Confidentiality

d) Authentication

 

 

  1. The science of devising methods that allow information to be sent in a secure form in such a way that the only person able to retrieve this information is the intended recipient is called

a) Cryptography

b) Steganography

c) Bibliography

d) None of these

 

 

  1. Which type of cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public.

a) Public Key Cryptography

b) Simple Cryptography

c) Symmetric Key Cryptography

d) None of these

 

 

  1. In which principle, the message is broken into blocks, each of which is then encrypted i.e. like a substitution on very big characters - 64-bits or more?

a) Block Cipher Principle

b) Stream Cipher Principle

c) Confusion & Diffusion Principle

d) None of these

 

 

  1. The Claude Shannon theoretically introduced the following principles that should be followed to design se-cure cryptographic systems.

a) Block Cipher Principle

b) Stream Cipher Principle

c) Confusion & Diffusion Principle

d) None of these

 

 

  1. Which algorithm was developed in the early 1970s at IBM and based on an earlier design by Horst Feistily, the algorithm was submitted to the National Bureau of Standards (NBS) for the protection of sensitive, unclassified electronic government data?

a) DES

b) Triple DES

c) AES

d) RSA

 

 

  1. Which algorithm uses a 64 bit key as input? Out of the 64 bits every 8th bit is ignored and only 56 bits are used.

a) DES

b) Triple DES

c) AES

d) RSA

 

 

  1. Which algorithm describes the use of three keys in the following encryption and decryption process?

C = EK3 [DK2 (EK1 (P))]

P = DK3 [EK2 (DK1(C))]

a) DES

b) Triple DES

c) AES

d) RSA

 

 

  1. Which mode of operation describes the process of encrypting each of these blocks, and generally uses randomization based on an additional input value, called as initialization vector?

a) Symmetric Cipher Mode

b) String Cipher Mode

c) Block Cipher Mode

d) None of these

 

 

  1. Two integers a and b are said to be congruent modulo n, if

a) a bmod n

b) a nmodb

c) b amod n

d) None of these

 

 

  1. Two numbers are said to be relatively prime to each other if there is no factor common between them other than

a) 1

b) 2

c) 3

d) 0

 

 

  1. Which theorem states that if ‘p’ is a prime number and ‘a’ is a positive integer not divisible by p, then ap-1 = 1 mod p

a) Fermat’s Principle

b) Chinese Remainder Theorem

c) Euclidian Theorem

d) Euler’s Theorem

 

 

  1. Which algorithm describes that for every a and n that are relatively prime as

a) Fermat’s Principle

b) Chinese Remainder Theorem

c) Euclidian Theorem

d) Euler’s Theorem

 

 

  1. In which encryption each communicating party generates a pair of keys?

a) Public Key Encryption

b) Symmetric Key Encryption

c) Private Key Encryption

d) None of these

 

 

  1. Authentication refers to the genuineness of the communicating entities. For example if A and B are communicating, both A and B should be aware of each other’s

a) Identity

b) Network

c) Application

d) None of these

 

 

  1. The process of verifying the integrity and authenticity of transmitted messages is called

a) Message Authentication

b) Message Integrity

c) Message Inspection

d) None of these

 

 

  1. The message authentication function includes

a) Message Encryption

b) MAC

c) Hash Function

d) All of the above

 

 

  1. Which version of hash function chosen in a public review process from non-government designers?

a) SHA-0

b) SHA-1

c) SHA-2

d) SHA-3

 

 

  1. Which version of message-digest algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input?

a) MD2

b) MD4

c) MD5

d) None of these

 

 

  1. Which attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory?

a) Brute Force Attack

b) Birthday Attack

c) Cryptanalysis

d) None of these

 

 

  1. Which scheme typically consists of three algorithms as key generation, signing algorithm and signature verification?

a) Digital Signature

b) MD5

c) RSA

d) SHA

 

 

  1. Which management has two main aspects of distribution of public keys and use of public key encryption to distribute secret keys?

a) Key Management

b) Protocol Management

c) Distribution Management

d) None of these

 

 

  1. Which certificates allow key exchange without real time access to public key authority?

a) Public Key Certificates

b) Private Key Certificates

c) Digital Certificates

d) All of the above

 

 

  1. The 1st published public-key algorithm was invented by Whitfield Daffier and Martin Hellman in 1976. Which name was referred to this algorithm?

a) Whitfield-Martin key exchange

b) Daffier-Hellman key sharing

c) Whitfield-Martin key generation

d) Daffier-Hellman key exchange.

 

 

  1. Which key is associated with the identity contained in the X.509 certificate?

a) Private Key

b) Public Key

c) Symmetric Key

d) None of these

 

 

  1. Which is a security architecture that has been introduced to provide an increased level of confidence for exchanging information over an increasingly insecure Internet?

a) PKI

b) Digital Signature

c) X.509

d) None of these

 

 

  1. Which protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection?

a) Kerberos

b) PGP

c) MIME

d) None of these

 

 

  1. Which authentication protocol was developed by Phil Zimmerman, who developed this encryption system for humanitarian reasons?

a) Kerberos

b) PGP

c) MIME

d) S/MIME

 

 

  1. Which protocol provides the cryptographic security services for electronic messaging applications?

a) Kerberos

b) PGP

c) MIME

d) S/MIME

 

 

  1. Which member of IPSec protocol suite provides connectionless integrity and data origin authentication for IP datagram and provides protection against replay attacks?

a) Authentication Headers (AH)

b) Encapsulating Security Payloads (ESP)

c) Security Associations (SA)

d) None of these

 

 

  1. Which protocol was originally developed by Netscape, to ensure security of data transported and routed through HTTP, LDAP or POP3 application layers?

a) Authentication Headers (AH)

b) Encapsulating Security Payloads (ESP)

c) Security Associations (SA)

d) Secure Socket Layer (SSL)

 

 

  1. Which protocol is used to initiate a session between the server and the client?

a) SSL

b) Handshake Protocol

c) ESP

d) None of these

 

 

  1. Which protocol has the potential to emerge as a dominant force in the securing of electronic transactions?

a) Digital Signature

b) SSL

c) ESP

d) Secure Electronic Transactions (SET)

 

 

  1. Which security mechanisms of a system are designed to prevent unauthorized access to system resources and data?

a) IDS

b) Firewall

c) Antivirus Software

d) None of these

 

 

  1. Which software is a code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks?

a) Malicious Software

b) Freeware

c) Antivirus

d) Firewall

 

 

  1. Which security mechanism protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service?

a) Firewall

b) Antivirus

c) Honeypot

d) IDS

 

 

  1. Which law touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace?

a) IT Law

b) IT Act

c) Cyber Law

d) None of these

  Answers :-

Only after macking the payment you would be able to see the answer...!!!

Review

Average user rating

4.8 / 5

Rating breakdown

5
80% Complete (danger)
1
4
80% Complete (danger)
1
3
80% Complete (danger)
0
2
80% Complete (danger)
0
1
80% Complete (danger)
0

January 29, 2015
This was nice in buy
Assignment from solve zone is probably one of the first preference of students.

October 09, 2016
This was nice in buy
I recommend a website that was really helpful throughout your session.

March 19, 2017
Some day ago
This was nice in buy
This was good in buy . I found all the answer correct and meaningful and had scored good marks
Back to top