University Of Pune Question Paper
M. C. M. (Semester - IV) Examination - 2010
CYBER LAW
(Old 2005 Pattern)
Time : 3 Hours] [Max. Marks : 70
Instructions :
(1) Q. Nos. 1 and 6 are compulsory.
(2) Solve any three from Q. Nos. 2 to 5.
Q.1) What is Cryptograhy ? Explain Symmetric and Asymmetric
Cryptography Algorithms commonly used. [20]
Q.2) Explain provision of Digital Signature Certificate in IT Act, 2000. [10]
Q.3) Explain Access Control in Windows and Unix. [10]
Q.4) Explain Common Networks and Technical Attacks and their defences. [10]
Q.5) Explain Hacker, Hacking and Hacking Techniques. [10]
Q.6) Write short notes : (Any Four) [5x4=20]
(a) Hash Function
(b) PKI
(c) Biometric Techniques
(d) Concurrency in Distributed Systems
(e) Unauthorised Computer Access under IT Act, 2000
(f) Incident Response Team
M. C. M. (Semester - IV) Examination - 2010
CYBER LAW
(Old 2005 Pattern)
Time : 3 Hours] [Max. Marks : 70
Instructions :
(1) Q. Nos. 1 and 6 are compulsory.
(2) Solve any three from Q. Nos. 2 to 5.
Q.1) What is Cryptograhy ? Explain Symmetric and Asymmetric
Cryptography Algorithms commonly used. [20]
Q.2) Explain provision of Digital Signature Certificate in IT Act, 2000. [10]
Q.3) Explain Access Control in Windows and Unix. [10]
Q.4) Explain Common Networks and Technical Attacks and their defences. [10]
Q.5) Explain Hacker, Hacking and Hacking Techniques. [10]
Q.6) Write short notes : (Any Four) [5x4=20]
(a) Hash Function
(b) PKI
(c) Biometric Techniques
(d) Concurrency in Distributed Systems
(e) Unauthorised Computer Access under IT Act, 2000
(f) Incident Response Team
0 comments:
Pen down your valuable important comments below