BIT 5th Semester
Information Security Board Question Paper 2080

Views: ...

BIT 303-2080 ✡

Tribhuvan University

Institute of Science and Technology

TUpapers.com TUpapers.com
Bachelor Level/Third Year/Fifth Semester/Science
Bachelors in Information Technology (BIT 303)
(Information Security)
Full Marks: 60 Pass Marks: 24 Time: 3 hours

Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.

Section A
Long Answer Questions
Attempt any Two questions.
[2x10=20]
1.

Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm.

2.

Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain.

3.

Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol.

Section B

Attempt any Eight questions

[8×5=40]
4.

Discuss about two factor authentication with an example.

5.

Explain the different types of access control principles.

6.

Describe any two types of malicious software.

7.

What is risk assessment? Describe the security auditing architecture.

8.

Do cybercrime and computer crimes refers to same? Justify with relevant scenarios.

9.

What do you mean by countermeasures for malwares? Discuss about audit trail analysis.

10.

List some issues for user authentication. What is trust framework?

11.

What is the role of digital signature in message authentication? List any two natures of zombies.

12.

Write the algorithm for RSA key generation with encryption and decryption.