Attempt any Eight questions.
[8*5=40]
4.
Define authentication. How Biometric information can be used for authentication? [5]
5.
What is access control? Explain attribute based access control with example. [5]
6.
Decrypt the cipher text "CRHG" using the Hill cipher with the key matrix . [3345] [5] 7.
What is security risk assessment? What are different aspects of a successful security risk assessment? [5]
8.
Differentiate between virus, worm and Trojan horse. [5]
9.
What is Security threat and attack? Describe different types of attacks in brief. [5]
10.
Explain Diffie Hellman Key Exchange Protocol with suitable example. [5]
11.
Define Euler Totient function. Determine whether 37 is Composite or not using Miller Rabin Primality testing. [5]
12.
Write Short Notes on: a. Phishing Attack b. Two Factor Authentication [5]