Differentiate between Asymmetric key cryptography and symmetric key cryptography?
Please rotate your device horizontally for split view
Access and download Information Security Ele II question papers from Savitribai Phule Pune University (SPPU). Our collection includes INSEM (Internal Semester) and ENDSEM (End Semester) exam papers.
We offer 1 question papers for Information Security Ele II, covering various exam patterns and years. All papers are in PDF format for easy viewing and download.
Prepare for mid-term evaluations with Information Security Ele II INSEM papers, aligned with the SPPU exam pattern and syllabus.
Access Information Security Ele II ENDSEM papers covering the entire syllabus, essential for final exam preparation.
Our question-paper viewer enables you to:
SPPU Question Papers Hub is focused entirely on SPPU previous year papers, with cleaner discovery by branch, semester, and subject.
Information Security Ele II is a key subject in the SPPU curriculum. Our question paper collection helps students understand exam patterns, practice effectively, and improve academic performance.
Explore Information Security Ele II resources including SPPU question papers from Savitribai Phule Pune University. Find INSEM and ENDSEM papers for effective examination preparation. Our platform offers academic resources, a PDF viewer for online study, university question papers, and materials for semester examinations.
Download all INSEM question papers as ZIP
Download all ENDSEM question papers as ZIP
Download all question papers (INSEM + ENDSEM) as ZIP
Differentiate between Asymmetric key cryptography and symmetric key cryptography?
What are the different types of attacks possible on RSA? Explain in brief ?
Explain Chinese reminder Theorem?
Explain ECC for the finite field with points y2 = x3 + ax + b?
Perform encryption and decryption using RSA algorithm for the following: P = 3; q = 11; d = 7; M = 5
Explain El-Gemmal Algorithm in detail?
What services are provided by IPSec? What is the difference between transport mode and tunnel mode in IPSec?
Explain the MD5 algorithm in brief ?
What is Message Digest? Compare MD-5 with SHA-I?
Explain the contents of X.509 format of certificate with diagram?
Write a short note on : i) Honeypot ii) Distributed DOS attack
What are the capabilities and limitations of Firewall?
What are Intrusion Prevention policies? Explain in brief?
Discuss operating system security in detail?
Write short note on : i) Cyber Terrorism ii) Social Engineering
Write short note on : i) Keyloggers and Spywares ii) Password Cracking
Write short note on Amendments of IT ACT in India?
Write short notes on keyloggers and spyware? Also explain the severity of the incident?
| Subject Name | Information Security Ele II |
|---|---|
| Semester | VI |
| Pattern Year | 2019 |
| Subject Code | 310254 (A) |
| Max Marks | 70 |
| Total Questions | 8 |
| Duration | 2½ Hours |
| Paper Number | [6403]-46 |
| Academic Year | T.E. |
| Branch Name | Computer Engineering |
| Exam Type | ENDSEM |
| Exam Session | 2025 May Jun Endsem |
| Watermark | ['CEGP013091', '49.248.216.237 02/06/2025 09:45:31 static-237'] |
Select a question to generate an answer