Wednesday 3 August 2016

mca5042 smu mca summer 2016 (oct/nov 2016 exam) vth sem assignment

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412

PROGRAM MCA
SUBJECT CODE &
NAME
MCA5042- Cryptography and Network Security
Qus:1 Describe the stream and block encryption with their advantages and disadvantages.
Answer:
Block ciphers are more powerful objects, with a more complicated interface ("encrypt or decrypt an arbitrary block of data", instead of just "produce a keystream" or "produce a keystream with this nonce"). 


Qus:2 Compare DES and AES algorithms.
Answer:
Compare DES and AES algorithms:


Qus:3 Explain Developmental Controls and Administrative Controls for software development.
Answer:
Developmental Controls and Administrative Controls:
Developmental Controls:

Software

Qus:4 List all the models of security and explain any two models for operating system security.
Answer:
The models of security:
·         Multilevel security
·         Lattice model of access security:
·         Bell–La Padula confidentiality model:
·         Biba integrity model:
Multilevel security:

Ideally, we want to build a model to represent a range of sensitivities and to reflect the need to separate subjects rigorously from objects to which they should not have access. For instance, consider an election and the sensitivity of data involved in the voting process. The names of the candidates are

Qus:5 Define and explain IP security. Explain its architecture.
Answer:
IP security:
IPSec provides connectionless, best-effort delivery of datagrams through a network by protecting it from snooping or modification. IPSec protects IP datagrams by defining a method of specifying the traffic to protect, how that traffic is to be protected, and to whom the traffic is sent. IPSec can protect packets between hosts, between network security gateways, or between hosts and

Qus:6 Describe guard and personal firewalls.
Answer:
Guard and Personal firewalls:
Guard:
A guard is a sophisticated firewall. Like a proxy firewall, it receives protocol data units, interprets them, and passes through the same or different protocol data units that achieve either the same result or a modified result. The guard decides what services to perform on the user's behalf in

Get fully solved assignment. Buy online from website
online store
or
plz drop a mail with your sub code
we will revert you within 2-3 hour or immediate
Charges rs 125/subject
if urgent then call us on 08791490301, 08273413412



No comments:

Post a Comment