Describe the Deffie-Hellman Key Exchange in detail.
Please rotate your device horizontally for split view
Access and download Cyber Security question papers from Savitribai Phule Pune University (SPPU). Our collection includes INSEM (Internal Semester) and ENDSEM (End Semester) exam papers.
We offer 7 question papers for Cyber Security, covering various exam patterns and years. All papers are in PDF format for easy viewing and download.
Prepare for mid-term evaluations with Cyber Security INSEM papers, aligned with the SPPU exam pattern and syllabus.
Access Cyber Security ENDSEM papers covering the entire syllabus, essential for final exam preparation.
Our question-paper viewer enables you to:
SPPU Question Papers Hub is focused entirely on SPPU previous year papers, with cleaner discovery by branch, semester, and subject.
Cyber Security is a key subject in the SPPU curriculum. Our question paper collection helps students understand exam patterns, practice effectively, and improve academic performance.
Explore Cyber Security resources including SPPU question papers from Savitribai Phule Pune University. Find INSEM and ENDSEM papers for effective examination preparation. Our platform offers academic resources, a PDF viewer for online study, university question papers, and materials for semester examinations.
Download all INSEM question papers as ZIP
Download all ENDSEM question papers as ZIP
Download all question papers (INSEM + ENDSEM) as ZIP
Describe the Deffie-Hellman Key Exchange in detail.
Identify and explain the authentication methods.
Distinguish between Kerberos and X.509 authentication service.
What is Digital Signature Standard? Explain the DSS approach.
Explain the RSA algorithm in detail with the help of diagram.
Explain Message Digest algorithm in detail.
Explore Secure Socket Layer Handshake protocol in detail.
What is VPN? Explain types of VPN.
Describe IPSec Protocol with its components and Security Services.
Distinguish between PGP and S/MIME.
Explain ISAKMP protocol of IPSec.
Identify Threats to web Security and figure out how any of two among listed are countered by particular feature of SSL.
Differentiate packet filtering router and stateful Inspection firewall.
What is trusted system? Explain in brief.
List limitations of Firewall.
Illustrate Screened subnet firewall Architecture.
List and Explain types of intrusion detection system (IDS)
Identify and explore any two-password management practice.
Identify and explore the different types of Cyber stalker attacks.
Illustrate life cycle of cyber forensics?
List VoIP hacking types and explore any 3? What are the counter measures for it.
Who are cyber criminals? What are types of cyber crimes.
What is Botnet? How to protect from botnet?
Explain the terms: i) Virus ii) Phishing iii) Spoofing iv) Phone phishing v) Internet pharming vi) Cyber Forensic
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 70 |
| Total Questions | 8 |
| Duration | 2½ Hours |
| Paper Number | [6003]-543 |
| Academic Year | T.E. |
| Branch Name | Artificial Intelligence and Data Science |
| Exam Type | ENDSEM |
| Exam Session | 2023 May Jun Endsem |
| Watermark | ['CEGP013091', '49.248.216.238 23/06/2023 10:42:20 static-238'] |
Explain Public Key Cryptography.
Perform encryption and decryption using RSA algorithm for p=l 7, q=31, e = 7 and M = 2.
Explain the operations of Kerberos.
Explain operation of MD5 message digest algorithm.
User A and B use the Diffie-Helliman key exchange technique with a common prime q = 71 and a primitive root α = 7. i) If user A has private key XA = 5, what is A’s public key YA? ii) If user B has private key XB = 12, what is B’s public key YB? iii) What is the shared secret key?
Explain X.509 Authentication Service.
List and explain components of IPSec protocol.
What is VPN? Explain components of VPN.
Explain working of PGP in details.
List and explain various participants involved in Secure Electronic Transaction (SET).
Describe the SSL protocol in details.
What is S/MIME’? What are the benefits of S/MIME?
Explain the architecture of firewall.
What is trusted system? Explain in brief.
Difference between IDS and IPS.
List and explain types of Intrusion Detection System.
What is access control security service?
Describe operation of packet filtering firewall.
What is Cyber Staking.
Write short note on Mobile Hacking.
Explain Indian IT Act.
Explain PII impact level with examples.
Write short note on Cybercrime.
Write Advantages of cyber law.
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 70 |
| Total Questions | 8 |
| Duration | 2½ Hours |
| Paper Number | [6262]-57 |
| Academic Year | T.E. |
| Branch Name | Artificial Intelligence and Data Science Engineering |
| Exam Type | ENDSEM |
| Exam Session | 2024 May Jun Endsem |
| Watermark | ['CEGP013091', '49.248.216.238 17/05/2024 09:43:45 static-238'] |
Write short note on X.509.
What is Digital Signature Standard? Explain the DSS approach.
Perform encryption and decryption using RSA algorithm for p = 11, q = 3, e = 3 and M = 7.
Identify and explain the various methods of authentication.
Explain the operations of Kerberos.
In a Diffie-Hellman Key Exchange, Alice and Bob have chosen prime value q = 17 and primitive root = 5. If Alice’s secret key is 4 and Bob’s secret key is 6, what is the secret key they exchanged?
What is VPN? Explain types of VPN.
Explain IPsec also state the advantages of IPsec.
Distinguish between PGP and S/MIME.
Explain ISAKMP protocol of IPSec.
Explore Secure Socket Layer Handshake protocol in detail.
Distinguish between IDS and IPS.
List and explain types of intrusion detection system (IDS)
Enlist the various types of firewall.
Explain : i) Dictionary Attack ii) Social Engineering attack iii) Brute Force attack
What is Attribute-Based Access Control (ABAC)
What is trusted system? Explain in brief.
Differentiate packet filtering router and stateful Inspection firewall.
List types of VoIP hacking and Explore any 3? Describe a few counter Measures to prevent remote connectivity and VoIP hacking.
Who are cyber criminals? What are types of cybercrimes?
Explain Personally Identifiable Information PII.
What is cyberstalking? Compare between cyberstalking and physical stalking.
Explain the terms : i) Virus ii) Phishing iii) Spoofing iv) Mobile hacking v) Internet Pharming vi) Cyber Forensic
Compare Security and Privacy.
| Subject Name | Cyber Security |
|---|---|
| Semester | VI |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 70 |
| Total Questions | 8 |
| Duration | 2½ Hours |
| Paper Number | [6403]-57 |
| Academic Year | T.E. |
| Branch Name | AI & DS |
| Exam Type | ENDSEM |
| Exam Session | 2025 May Jun Endsem |
| Watermark | ['CEGP013091', '49.248.216.237 28/05/2025 09:38:07 static-237'] |
Evaluate encryption and decryption using RSA algorithm p=7, q=11, e=17 and M=8.
What is authentication? Explain various methods for authentication.
User A and B use the Diffie-Hellman Key exchange techniques with common prime q=71 and primitive root =7. i) If user A has private key XA=5 what is A’s public key YA? ii) If user B has private key Xb=12 what is B’s public key YB?
Distinguish between Kerberos and X.509 authentication service.
Describe IPsec protocol with its components & security services.
What is PGP? Explain operation of PGP.
Explain Secure Socket Layer Protocol?
Explain VPN architecture with its component.
List and explain any two password management practices.
What is IDS? Explain types of Intrusion detection systems (IDS).
Explain methods for intrusion detection system (IDS).
Explain countermeasures that can be implemented in Cyber security.
Define cybercrime? Explain it with its type?
Write short note on following: i) Cyber stalking. ii) Hacking.
Define Hacking? Explain different types of hacking.
Write short note on following: i) Information Protection Law. ii) PII.
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 70 |
| Total Questions | 8 |
| Duration | 2½ Hours |
| Paper Number | 6353-57 |
| Academic Year | T.E. |
| Branch Name | AI&DS |
| Exam Type | ENDSEM |
| Exam Session | 2024 Nov Dec Endsem |
| Watermark | ['CEGP013091', '49.248.216.237 28/11/2024 09:49:43 static-237'] |
List and explain various elements of Information Security.
Write difference between security and privacy.
Enlist the security goals and mechanisms.
Draw and explain operational security model for network security.
Define cyber security. Explain Active and passive attack.
Explain Feistel cipher.
Explain ceaser cipher with example.
Explain DES Algorithm.
Explain Monoalphabetic cipher with example.
Compaire symmetric key cryptography and Asymmetric key cryptography.
Use the transposition cipher to encrypt the message "WE ARE THE BEST" use key "HEAVEN".
Explain the following terms. i) Cryptography. ii) Crypt analysis. iii) Cryptology. iv) Crypto system. v) Steganography.
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 30 |
| Total Questions | 6 |
| Duration | 1 Hour |
| Paper Number | [6009]-425 |
| Academic Year | T.E. |
| Branch Name | AI & DC |
| Exam Type | INSEM |
| Exam Session | 2023 Feb Insem |
| Watermark | ['CEGP013091', '49.248.216.238 05/04/2023 12:01:46 static-238'] |
Draw and explain operational security model for network security.
Explain passive and active attack.
Write difference between security and privacy.
Define the following term with example. i) Symmetry ii) Asymmetry
What are the different threats and vulnerabilities in case of cyber security?
List and explain various elements of information security.
Explain DES Algorithm.
Explain One Time Pad with example.
Difference between AES and DES.
What is block cipher? Explain counter mode of block cipher.
Use the transposition cipher to encrypt the message “GEEKS FOR GEEKS” use key “HACK”.
Explain the following terms. i) Ciphertext ii) Cryptology iii) Crypto system iv) Steganography v) Plaintext
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 30 |
| Total Questions | 6 |
| Duration | 1 Hour |
| Paper Number | [6269]-325 |
| Academic Year | T.E. |
| Branch Name | AI & DS |
| Exam Type | INSEM |
| Exam Session | 2024 March Insem |
| Watermark | ['CEGP013091', '49.248.216.238 21/03/2024 10:36:02 static-238'] |
Draw and explain operational security model for network security.
Write difference between security and privacy.
Explain passive and active attack.
Define the following term with example. i) Symmetry ii) Asymmetry
List and explain various elements of information security.
What are the different threats and vulnerabilities in case of cyber security?
Explain One Time Pad with example.
Difference between AES and DES.
Use the transposition cipher to encrypt the message “GEEKS FOR GEEKS” use key “HACK”.
What is block cipher? Explain counter mode of block cipher.
Explain Play fair Cipher with example.
Explain DES Algorithm.
| Subject Name | Cyber Security |
|---|---|
| Semester | II |
| Pattern Year | 2019 |
| Subject Code | 317530 |
| Max Marks | 30 |
| Total Questions | 4 |
| Duration | 1 Hour |
| Paper Number | [6410]-425 |
| Academic Year | T.E. |
| Branch Name | AI & DS |
| Exam Type | INSEM |
| Exam Session | 2025 March Insem |
| Watermark | ['CEGP013091', '49.248.216.237 11/03/2025 10:32:04 static-237'] |
Select a question to generate an answer