KEMBAR78
Tybsc (CS) - CS - 352 Computer Networks - Ii | PDF | Public Key Cryptography | Telecommunications
0% found this document useful (0 votes)
900 views2 pages

Tybsc (CS) - CS - 352 Computer Networks - Ii

1) The document is a 5 question exam on computer networks with a maximum score of 35 marks. 2) Question 1 has 10 short answer questions worth 1 mark each on topics like FQDN, MIME headers, FTP, RTCP, playback buffers, cipher keys, SSL, VPNs, firewalls, and root DNS servers. 3) Question 2 has 5 short questions worth 2 marks each including explanations of POP3, streaming audio/video, transposition ciphers, TLS, and PGP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
900 views2 pages

Tybsc (CS) - CS - 352 Computer Networks - Ii

1) The document is a 5 question exam on computer networks with a maximum score of 35 marks. 2) Question 1 has 10 short answer questions worth 1 mark each on topics like FQDN, MIME headers, FTP, RTCP, playback buffers, cipher keys, SSL, VPNs, firewalls, and root DNS servers. 3) Question 2 has 5 short questions worth 2 marks each including explanations of POP3, streaming audio/video, transposition ciphers, TLS, and PGP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Total No. of Questions : 5] SEAT No.

:
P1301

38
[Total No. of Pages : 2
[6055]-302

ic-
T.Y.B.Sc. (Computer Science)

tat
CS - 352 : COMPUTER NETWORKS - II

7s
(CBCS 2019 Pattern) (Semester - V)

5:1
31 1
1
0:3
Time : 2 Hours] [Max. Marks : 35

6/2 02
Instructions to the candidates:
1
1) All questions are compulsory.
02
8 1 P0

2) Draw neat and labelled diagrams wherever necessary.


3) Use of calculators is not allowed.
A
6/0
8.7 CA

Q1) Attempt any EIGHT of the following (out of TEN). [8 × 1 = 8]

38
7.3

a) What is FQDN?

ic-
tat
b) Where does MIME header appear?

7s
.24

c) What is an anonymous FTP?


5:1
49

11
d) Give purpose of RTCP.
0:3
02

e) What is playback buffer?


31

f) What is Cypher key?


01
02

g) Does SSL mean HTTPS?


6/2
AP

h) What does a VPN do for?


6/0
CA

i) Define firewall.
81

38
j) What is the root server in DNS?
7.3

-
tic
8.7

sta

Q2) Attempt any FOUR of the following (out of FIVE). [4 × 2 = 8]


.24

:17

a) Explain Working of POP3.


49

11
:35

b) Discuss streaming live audio/video and give its examples.


02
10

c) What is meant by transposition cipher? Give example.


23
1

d) Explain working of TLS.


8 1 P0
/20

e) What PGP? Write its purpose.


06
A
6/
CA

Q3) Attempt any TWO of the following (out of THREE). [2 × 4 = 8]


7.3

a) What are the advantages and disadvantages of recursive DNS?


8.7

b) Write a short note on SIP.


.24

c) What are the steps used in DES?


49

P.T.O.
Q4) Attempt any TWO of the following (out of THREE). [2 × 4 = 8]

38
ic-
a) What is MAC? HMAC? Give one difference.

tat
b) Discuss various IPSec services.

7s
5:1
c) What is firewall? What are its types?

31 1
1
0:3
6/2 02
Q5) Attempt any ONE of the following (out of TWO). [1 × 3 = 3]
1
02
8 1 P0

a) How do digital signatures work?


A
6/0

b) In an RSA cryptosystem, a particular A uses two prime numbers, 13


8.7 CA

and 17, to generate the public and private keys. If the public of A is 35.

38
Then the private key of A is?
7.3

ic-
tat
7s
.24

5:1
49

  
11
0:3
02
31
01
02
6/2
AP
6/0
CA
81

38
7.3

-
tic
8.7

sta
.24

:17
49

11
:35
02
10
23
1
8 1 P0
/20
06
A
6/
CA
7.3
8.7
.24
49

[6055]-302 2

You might also like