BIT 5th Semester
Information Security Board Question Paper 2080

Views: ...

BIT 303-2080 ✡
Tribhuvan University
Institute of Science and Technology
2080
Bachelor Level/Third Year/Fifth Semester/Science
Bachelors in Information Technology (BIT 303)
(Information Security)
Full Marks:60 Pass Marks:24 Time:3 hours

Candidates are required to give their answers in their own words as for as practicable.
The figures in the margin indicate full marks

Section A
Long Answer Questions
Attempt any Two question.
[2x10=20]
1.

Define Euler totient function with an example. Find the GCD of 12 and 32 using Extended Euclidean algorithm.

2.

Describe the role of hash functions in authenticating message? How SHA - 1 algorithm is used to produce hash value of a message? Explain.

3.

Distinguish between threats and attack. Discuss some computer security strategy. Assume a prime number 23 and 9 as its primitive root. Alice select a private key 5 and Bob select the private key 6. Now find the secret key value that Alice and Bob shared using Diffie - Hellman protocol.

Section B

Attempt any Eight questions

[8x5=40]
4.

Discuss about two factor authentication with an example.

5.

Explain the different types of access control principles.

6.

Describe any two types of malicious software.

7.

What is risk assessment? Describe the security auditing architecture.

8.

Do cybercrime and computer crimes refers to same? Justify with relevant scenarios.

9.

What do you mean by countermeasures for malwares? Discuss about audit trail analysis.

10.

List some issues for user authentication. What is trust framework?

11.

What is the role of digital signature in message authentication? List any two natures of zombies.

12.

Write the algorithm for RSA key generation with encryption and decryption.