Attempt any Eight questions.
[8*5=40]
4.
How online and offline dictionary attacks are done in password based authentication systems? [5]
5.
Describe the roles of relying parties, attribute providers and identity providers in Open Identity Trust Framework. [5]
6.
Define zombies, rootkits and Trojans. [5]
7.
Briefly describe the status of cyber law in Nepal. [5]
8.
Discuss various methods of risk treatment during security risk analysis. [5]
9.
What is the use of S-box in DES? Illustrate S-box operation with an example. [5]
10.
How hash value is generated by the SHA-2 hash function. [5]
11.
Write Rabin Miller Algorithm for primality testing. Test whether 341 is prime or not using the algorithm. [5]
12.
Define interception, repudiation and incapacitation with examples. [5]