Exam Details
Subject | Network security | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2016 | |
City, State | new delhi, |
Question Paper
1. Write a program in C/Java to accept
8 bit string X
8 bit key K from the user.
Apply the following algorithm
Encryption: Y X XOR K
Decryption Reverse of Encryption
(Hint: Use special property of XOR.)
2. Perform an experiment on any machine on network in the lab for port scanning with Nmap/Superscan or any other S/W. Do the following analysis on remote machine
• Find open ports
• Find the OS version
• Find other s/w and version
• Find other active machines
3. Calculate the SHA-512 hash value for a word/text file that you have just created. Email this file to yourself and later on download this file from email and save it with some other name. Recalculate the SHA-512 hash value for downloaded file. Compare both hashes and comment on the results. Explain reason(s). Demonstrate hiding and retrieval of an image present on your PC to this word/text file using any steganography tool of your choice.
8 bit string X
8 bit key K from the user.
Apply the following algorithm
Encryption: Y X XOR K
Decryption Reverse of Encryption
(Hint: Use special property of XOR.)
2. Perform an experiment on any machine on network in the lab for port scanning with Nmap/Superscan or any other S/W. Do the following analysis on remote machine
• Find open ports
• Find the OS version
• Find other s/w and version
• Find other active machines
3. Calculate the SHA-512 hash value for a word/text file that you have just created. Email this file to yourself and later on download this file from email and save it with some other name. Recalculate the SHA-512 hash value for downloaded file. Compare both hashes and comment on the results. Explain reason(s). Demonstrate hiding and retrieval of an image present on your PC to this word/text file using any steganography tool of your choice.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws