0% found this document useful (0 votes)
30 views17 pages

Network Security Class Test Questions

Uploaded by

ManeeshMahajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views17 pages

Network Security Class Test Questions

Uploaded by

ManeeshMahajan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

I B. Tech. (CSE+IT).

II Semester, 2021-22
Network Security (ECS-362)
I Class Test
Time: 1 Hr 30 Mins. Max Marks: 30
Note Attempt all questions.
1. Describe all steps encryption and decryption in S-DES with appropriate example. (5)
2. Describe security services, mechanisms and attacks. State X.800 standards. (5)

3. (1) How encryption and decryption are performed in playfair cipher? Explain with (5)
suitable example.

(II) Differentiate mono alphabetic and poly alphabetic ciphers with example.

4. Perform encryption and decryption using RSA algorithm- (5)


P=5,
M
q=11, e=3, m-9. = K
. Explain various modes of operation with the help of suitable diagrams. How do they cater to
different types of applications? (5)

6. Explain distribution of private key using symmetric key crYptography. (5)


Date of showing evahuated answerbooks: 25/06/2022 Roll No. I 9 . 1 0 . O . . . ..

No. of Printed Pages: 02


KANPUR
HARCOURT BUTLER TECHNICAL UNIVERSITY,
B. Tech.
End Semester Examination
Even Semester (VI), 2021-22
ECS-362: NETWORK SECURITY
Max. Marks: 50
Time: 2.30 Hours them.
shown against
Note: 1. Attempt all questions. All questions carry marks,
as

Please mention all the Course Outcomes in statement form


(C0)
secure data in
networks. (Understand, Appiy)
Understand and deploy cryptographic techniques to
1. system and design
a security
solution.
(APpl
2. Analyze the vulnerabilities in any computing
Analyse) and authenticity. (Understand,
3. Understand and use standard algorithms for confidentiality, integrity
Apply) schemes in network system. (Apply)
4. Apply key distribution and management
various
5. Apply security protocols in various IT applications. (Apply)
Related Marks
Course
Outcome
(CO)

Q. No. 1: Attempt all parts of the following: Differentiate the (05)


What services are being offered under network security?
(a)
following pairs:
Brute Force Search and Cryptanalysis
(i) attack
Known plaintext attack and chosen plaintext
(ii)
the role I(05)
Write down the algorithm for S-DES encryption and decryption. Explain
(b)
of S-Boxes in S-DES algorithm.

Q. No.2: Attempt all parts of the following:


RSA algorithm for the following:
2 (05)
Pertform encryption and decryption using
(a)
n=l19, message M=6.
p=17, 9=7, e=5, M have usual meanings.
Show all the steps of
Here p, 9, e and
in RSA
involved in encryption and decryption
calculations. Write down the steps

algorithm.
applications. 2 (2.5)
Theorems with their
Describe Fermat's and Euler's
(b)
certif+cate scheme. 2 (2.5)
Explain distribution of public-key using public-key
(c)
Or

let prime numbers be l1 and 7. Let


In Diffie-Hellman key exchange algorithm,
Xa 3 and XB 6 to exchange secret key
=

A and B select their secret keys


=

between two communicating parties. Compute


(i) Public keys of A and B

(i) Common secret key

Q. No. 3: Attempt all parts of the following:


Write the DSS (digital
3 (05)
(a) Enlist security services provided by digital signature.
and verif+cation. Prove
Signature standard) scheme of digital signature generation
the correctness of the verifying process.
Differentiate 3 (05)
(b) Describe secure algorithm (SHA) using suitable example.
hash
secure hash algorithms (SHA).
MAC (Message Authentication Code) and

Q. No. 4: Attempt all parts of the following


electronic mail system?
4 (05)
(a) What are major security aspects in the security of
Explain the working of PGP (Pretty Good Privacy).

defined for Kerberos? Explain the duties of each


server. 4 (05)
(b) What requirements are
to
Write the sequence of message exchanges
that happens when a client attempts
obtain a service granting ticket in Kerberos 4

of the following:
Q. No. 5: Attempt all parts IP Sec. How 5 (05)
of Security Association (SA) in
(a) Explain the requirements and tunnel modes in IP Sec
Authentication Header (AH) is used in transport

protocol?
the various services are 5 (2.5)
Web Security. What are
(b) Enlist the various components of
being offered by secure
socket layer (SSL)?
and its mitigation? 5 2.5)
(c) What do you mean by web security threats
Or

working of Secure socket layer (SSL) in web security.


Write down the role and
MID SEMESTER EXAMINATION 2021-22

III (CSE +IT)

Computer Graphics (ECS-356)

Time: 90 Min. MM: 30

Note: Attempt All Questions.


Q.1: Derive midpoint ellipse algorithm. (10)
Q.2: What is polygon fill? Name the various fill algorithms. Explain scan-line polygon fill
algorithm. (10)
Q.3: Find out final transformation matrix, when point P (x, y) is to be reflected about a line

y mx +c (10)
Date of showing evaluated answer books: 25/06/2022
No. of Printed Pages: 02 Roll No. 0 s U s o
***********************

HARCOURT BUTLER TECHNICAL UNIVERSITY, KANPUR


3 (CSE +IT)
VIh Semester (Even) Examination 2021-22
ECS-356: Computer Graphics

Time: 2:30 Hours Max. Marks: 50


Note: Attempt all questions. All questions carry marks, as shown against them.

Course Outcomes (cO) in statement form:


1. Understand and use various mathematical concepts and supporting composite 2-D & 3-D graphics
transformations for hidden surface detection/ removal and various graphical algorithms. (Understand,
Apply) 2. Design algorithms for various graphics shapes like ellipse, hyperbola, triangle etc. (Apply)
3. Use of various graphical tools and software in 3D Graphics API (e.g. OpenGL or DirectX). (Apply)
4. Understand and apply geometrical transformation and computer graphics in multidisciplinary field
of engineering. (Apply)
5. Understand the hardware system architecture for computer graphics graphics pipeline, frame
buffers, and graphic accelerators/co-processors. (Understand)
Related Marks
Course
Outcome
(co)
Q. No. 1: Attempt All the Questions.
(ay Explain the architecture of simple random scan display system. What are the COi (05)
merits and demerits of random scan display systemn?
(b Derive midpoint circle algorithm. co (05)

[Link].2: Attempt All the Questions.


Derive the window to viewport transformation and elaborate. CO2 (2.5)
(a) (2.5)
Explain the Sutherland- Hodgeman Polygon- Clipping algorithm
OR
Describe the Midpoint subdivision algorithm
(b) Use the Cohen-Sutherland outcode algorithm to clip two lines Pi (40,15) - P2 CO2
(75,45) and Pa (70,20) Pa (100,10) against a window A(50,10), B(80,10),
(05)
e c(80,40), D(50,40)
,

Q. No. 3: Attempt All the Questions.


(a) Show how reflection in the line y =x andin the line y =-x can be performed by a CO3 (05)
scaling operation followed by a rotation?

(b) Give the mathematical description for the perspective projection.


CO3
(05)

1
Q. No. 4: Attempt All the Questions.
CO4
Give the mathematical description of Bezier curve with respect to blending (05)
Aa) function. Explain the properties of Bezier
curves CO4 (05)
(b) Explain the Z-buffer algorithm for hidden surface removal. List the advantages
and disadvantages of Z-buffer algorithm.

Q. No. 5: Attempt All the Questions.

(a) Explain diffuse reflection and Specular reflection. Give the illumination model COS (05)
that incoporate these reflections.
Write short notes on the followings: CO5 (2.5)
b
i ) Multimedia
i) Animation (2.5)
HARCOURT BUTLER TECHNICAL UNIVERSITY, KANPUR
EVEN SEM, I MID SEM EXAM, 2021-22
COMPILER DESIGN (ECS- 352)
CLASS - I CSE/IT ([Link])
TIME:1.5 hr
MAX MARKS:30
Note: Attempt all questions .
1. Explain all the phases of compiler in brief.
2. Explain the Context-Free Grammar with example. Also state the difference between Left Most
derivation and Right most derivation with proper grammar example.
3. Write a Short note on LEX compiler and Bootstrap compiler.
4. What do you understand by parsing? Name the types of parser. Also state the comparison between
Top-Down parser and Bottom-Up parser. 3
5. Perform the following operations as asked in the questions.
Find no of tokens in below program.
#includesstdio.h>
main)
int i: 12
int #pi = &i;//parent pointer 9
36 3
scanf("%d",pi); 26
printf(od\n", it5); 3
36 recursion. 21
i) Consider the following grammar and eliminate left
E E + T/T
T Tx F/F
F id
Do left factoring in ihe foliowing graminar.
S aAd/aB
A a /ab
Bccd/ddc
Calculate the first and follow functions for the given grammar. [21
iv)
S>(L)/a
L » SL'
L',SLlE (21
into unambiguous grammar.
Convert the following ambiguous grammar
RR+R/R. R/R* /a/b
where *is kleen closure [Link] concatenation.
6. Explain whether the given grammar is LL(1).
S->A la
A ->a
OR
1.
Design a FA from given regular expression 10+(0 +11)0*
**** All The Best****
Date
of showing evaluated answer hooks: 08.07.2022
No. of Printed
Pages:
02 Roll No. 19OouOO.
HARCOURT BUTLER TECHNICAL UNIVERSITY, KANPUR
II B. Tech. CS/IT End Semester Examination
Even Semester (V1), 2021-22
ECS-357: Compiler Design
Time: 2:30 Hours
Max. Marks: 50
Note:- 1. Attempt all questions.
2. All questions carry marks as shown against them.

Course Outcomes (CO)


1. Describe the role of each phase of a compiler with its construction tools.
(Understand)
2. a Lexical tokens of a given language with an understanding of symbol
Develop Analyzer for
recognizing
table management and emor handling. (Apply)
3. Construct top-down, bottom-up. operator precedence and SLR parsers with an understanding of Context
Free Grammars and syntax analysis. (Understand .Apply)
4. Design and develop semantic analyzers for type-checking and intermediate code generators to translate the
source program into an intermediate code. (Apply)
5. Construct code optimizers to optimize the target code generated. (Apply)

Q Question CO Marks
No.
1. Attempt all subparts of this question.
(a) Describe how various phases could be combined as a pass in a compiler? COI (05)
) Write short notes on following
(i) Lexical analyzer
CO(05)
(i) Boot Strapping
2. Attempt al subparts of this question.
(aHow a grammar can be termed as ambiguous? Determine whether the following CO2 (05)
grammar is ambiguous or not
SaSbS|b SaS|
(b) What do you mean by Tokens? How many tokens are present in the following CO2 (05)
expression?
intnum;
printf ("i= %d, &i =%x", i, &i);

3. Attempt all subparts of this question.


(a) Construct predictive parsing table for the following grammar CO3 (05)
E TE
E' +TE'|
T FT
*FT|
F id (E)
(b) | Construct a SLR(1) parsing table for following grammar CO3 (05)
S>(L)a
LL+S|S
OR
Explain whether the following grammar is LALR(1) grammar or not
S Aa | bAc|dc|bda
A

|4. Attempt all subparts of this questiu .

(a)What is an activation record? Expla how it is related with run time storage CO4 (05)
organization?
(b What do you mean by intermediate code
generation? Explain Quadruples, triples CO4
and indirect triples. (05)

5. Attempt all
subparts of this question.
(aExplain in detail about Loop optimization techniques with proper examples. COS (05)
(b)How a leader is
determined in abasic block? Draw a flow
graph of the following CO5
code. (05)

2 b= 15
C

E J,

3
in COi, CO3
(bDifferentiate Aggregation and Generalization relationships
between
where both relations
Classes and objects diagrams. Give an example
coexist in a class diagram.

Q:No. 3 Attempt ALL subparts of this question.


CO2, CO03
over flat states
(a) What are the advantages of nested states diagrams
of Traffic Control
diagrams? Prepare States Diagram for functioning
System for a Crossroad in a Smart City.
automatiC CO2, CO03
transition,
6) Explain the concepts of activity, action, guarded
transition in States diagrams using suitable example(s).

Q. No. 4 Attempt ALL subparts ofthis question. Draw CO4


Process.
case diagrams in Unified
(a) Discuss the importance of use
Use Case diagram for Library management System. How CO3
What are the benefits of using Component Diagrams?
(b) Discuss various
dependencies shown in Component Diagrams?
are
with the help of suitable
ypes of dependencies in Component diagrams
examples.
Q. No. Attempt ALL subparts of this question.
useful? Explain the CO5
What Design patterns in UML? How they are
are

Composite or Adapter design patterns with a suitable example.


Discuss how Object Oriented technologies have been useful in web COS

services?

Q. No. 6 (Laboratory Component): Attempt ALL subparts of this question COS


receives
applet that
Describe the life cycle of an applet. Develop an

and displays the largest of the three


three numeric values from the user

on the sereen. Write a HTML page that embeds this applet.

in CO5
(b) What is a thread? How do threads behave in Java? Write a program
Java showing the action from three threads using a suitable example

OR
What are the various approaches to connect Java programs to a
database? Explain any one approach in details with the help of a
suitable example.

2
Harcourt Butler Technical
University, Kanpur
[Link] CSE (3d Year)
Mid Term Exam (Even
Semester), 2021-22
Object Oriented System (ECS- 354)

TIME: 1Hr 30 Min


MM: 15
NOTE: ATTEMPT ALL
QUESTIONS.
Q1. What do you understand by Obiect Oriented Design. [3]
Q2. Differentiate between Designing and modeiling. [3]

R3. Write different principles of modelling. [3]

Q4. Explain the OOPS Concept. [3]

Q3. Define UML and explain the concept of things in UML building blocks. [3]
books: 30.06.2022 DY 0
Date ofshowing evaluated answer Roll No. . 0/
'*******'*****'**. ***
No. of Printed Pages: 02

TECHNICAL UNIVERSITY, KANPUR


HARCOURT BUTLER
B-TECH
End Semester Examination

Even Semester (VI), 2021-22


ECS-358: Soft Computing
Max. Marks: 50
Time: 2:30 Hours shown against them.
1. all questions. All questions carry marks, as
Note Attempt and Intelligent Systems.
1. Understanddifferential behavior of Human ANN.
2. Understand and use supervised and un-supervised
learning techniques in
techniques like Genetic Algorithms, Fuzzy
3. Understand and apply different soft computing
combination.
Logic, Neural Network and their in various
4. Correlate human- like processing
in problem solving with current technologies
Data Analytics, etc.
domains like Bio Informatics, Multimedia Systems, Big
5. techniques in real life problems.
Apply evolutionary computing
Course Marks
Outcome
(CO)

Q. No. 1: Attempt both questions.


do you understand by intelligent systems? Explain
its characteristic CO (05)
(aWhat
behavior. CO (05)
between Hard and Soft
(b What do you understand by soft computing? Differentiate
Computing
Q. No.2: Attempt both questions.
method. CO2 (05)
(a) Differentiate Single layer perceptron and multilayer perceptron
between
CO2 (05)
and explain about the updation
(b)Write the algorithm for back propagation training
of weights.

Q. No. 3: Attempt both questions.


What are its uses? CO3 (05)
(aDefine Hebb's Learning rule for competitive Learning.
OR
Explain the concept of Kohonen's self- organizing map (SOM) with its
applications.
CO3 (05)
(b)Explain the concept of Adaptive Resonance Theory.

Q. No. 4: Attempt both questions. CO3 (05)


inference systems with example.
Explain the cocept of fuzzy CO3 (05)
(bExplain the difterent methods of Defuzification.

Q. No. 5: Attempt both questions.


Draw its general flow diagrams of genetic CO4 (05)
( What is Genetic Algorithm?
Algorithms.

1
COS (05)
(b) Wpie short notes on:
Fitness Function
(i
G Rank Selection
OR intormation
in image processing,
Explain the use of evolutionary computing
web.
retrieval, computer vision and semantic

2
lays after exam

evaluated answer
booKS:
I
Roll No...0ou 00 **
Date ofshowing *'*'°***°***
No. of Printed Pages: 01
BUTLER
TECHNICAL UNIVERSITY, KANPUR
HARCOURT End Semester Examination

(1Ird [Link].), 2021-22


Even Semester
Entrepreneurship Development
HHS 352:
Max. Marks: 50
Time: 2:30 Hours
Note: 1. Attempt all questions.
marks, as shown against them.
2. All questions carry
Course Outcomes (CO) in statement form
Please mention all the become an entrepreneur; including,
describe multiple ways to
1. Describe what it takes an Entrepreneur, to become entrepreneur.
woman entrepreneur
rural & urban: highlights motives
intrapreneur, and manager, small scale enterprises.
and various forms with focus on
2. Apply the beginner concept, ownership & evaluation.
conceptualization, formulation
3. ldentify opportunities using identification; project
and strategic management
human resources, marketing, financial
4. ldentify potential contribution of
with fund, opportunities for enterprises in India.
and policy framework of Government
5. Decipher the role of lnstitution support
Related Marks
CO

[Link]. 1: Attempt any two ofthe [Link] of an entrepreneur. CO1 5*2 10


(a) Who is an entrepreneur? Discuss the main
that support rural entrepreneurship.
5Discuss rural entrepreneurship; [uggest some schemes
in detail.
)Enumerate the different objeciives ofEDP
[Link]. 2: Attempt any followings.
two of the 5*2-10
CO2
[Link] developing MSMEs.
a) Define MSMEs. Elucidate Role of
& short term source of finance?
b) Distinguish between long term
of company formation? Explain.
eWhat is the process
[Link]. 3: Attempt any two of the followings cO3 5*2 10
formulation? Explain its Significance in developing project.
(a What project
is
(6) Give a specimen of a project report for any industry.
(c)What is a project? Explain various phases of project management.
[Link]. 4: Attempt any two of the followings.
(a)Explain marketing mix with
suitable example.
CO4
5*2-10
Explain main strategies for business growth.
b)Discuss theprocess ofstrategy formulation,
is human resource management and explain its functions.
(CWhat
[Link]. 5: Attempt any two of the followings.
framework to promote small scale industry in India. CO5 5*2-10
(a) Discuss the Institutional
are the different functions of a
TCO? Explain in detail.
(by What
(c) Who is a venture capitalist? What is the need of venture capital in startups?
HARCOURT BUTLER TECHNICAL UNIVERSITY, KANPUR
MID SEMESTER EXAMINATION 2021-22
Entrepreneurship Development(HHS-352)
[Link] 3 year (ET/CE/EE/ME/CSE/IT)
TOTAL MARKS 30 TIME: 1:30 hr.

1. How ideation is related to entrepreneurship? Enumerate different phases of entrepreneurial


process. [7.5]
2. Critically examine Schumpeter's thought in comparison to Drucker's with respect to
entrepreneurship. [7.5]
3. Define MSMEs? Briefly explain about the significance of MSME in India. [7.5]
4. Evaluate Sole-Proprietorship as form of business ownership. (7.5)
Harcourt Butler Technical University, Kanpur
[Link] CS/ IT (3" year)
Mid Term Exam (Even Semester), 2021-22
Soft Computing (ECS-358)

TIME: 1Hr 30 Min MM: 30

NOTE: ATTEMPT ALL QUESTIONS.


Qi. What is soft conputing? Differentiate between Hard & Soft computing. I5]

Define Knowlelge based System. What are different types of knowledge? |5]

A3. Define fuzzy, urisp and rough set with an example. [5]

Q4 Explain characteristic behaviour of intelligent systems. [5]

A5. Explain diffej ent types of operations performed on fuzzy sets by taking an example of
each. [5

06 Define fuzzy interference systems. And explain if-then rule. [5]

You might also like