Ad
Sunday, August 27, 2023
COMPUTER NETWORKS - II : TYBCS : SPPU : PYQs
Chapter 1 : Application Layer
1 mark
b) Write two types of connections used by FTP. Also write their port numbers.
d) What is anonymous FTP?
Q. Compare and contrast FTP and HTTP.
Q. Which file types can be transferred on ftp.
b) Write services provide by user agents, and explain composing message?
c) Explain any four user agent services.
c) What are the services provided by user agent?
(f) What is DNS ?
2 mark
b) List types of server. Write short note on any one type.
a) What is PrimaryServer?
h) What are the parts of Email address?
(c) Write a short note on SMTP.
c) Write information about iterative resolution, with diagram.
c) Write advantage or POP.
a) What is IMAP4? Write it’s features, advantages and disadvantages.
4 mark
a) Write difference between flat name space and hierarchical name space.
(i) What are the different data structure supported by FTP ?
b) Explain hierarchical name space.
(c) Write a short note on different types of user agents.
Chapter 2 Multimedia
1 mark
a) SMTP is a push protocol. State true or false, Justify
c) Define Jitter and Translation.
2 mark
d) What is streaming live audio/video?
b) What is streaming audio/video? Also write examples.
4 mark
c) Explain Streaming Stored Audio / Video first approach: using a web server, with advantages and disadvantages.
a) Explain Real-Time Interactive Audio / Video with diagram.
Chapter 3 Cryptography and Network Security
1 mark
d) What is used of “BYE” message in SIP (Session Initiation Protocol)?
h) Define cryptography.
i) Encrypt the following plain text with given key using substitution cipher. Plain text: India is my county, Key = 4
(c) Encrypt the following plain text transposition cipher : Key : MAGNETIC Plain text : transmit this message
Q. By using substitution cipher transform the message, HONESTY IS THE BEST POLICY key is -5.
Q. (h) What is cipher ?
Q. By using transposition cipher convert the following:
Plain Text: The applicaton layer is the topmost layer in layered network model
Key: MEGABUCK
j) List methods for verifying the authenticity of the claimant.
(h) What is transposition cipher ?
2 mark
Q. Explan two fundamental cryptographic principles.
a) Which are traditional ciphers? Write working of shift cipher.
a) What is IMAP4? Write it’s features, advantages and disadvantages.
e) Define cryptanalysis.
g) Write name of steps perform in each round of DES (Data Encryption Standard) Cipher
f) What is S-box component of a modern block cipher?
e) What is Digital Signature?
4 mark
(a) By using transposition cipher convert the following plain text to cipher text. Using key ZQPBEXC. (a) By using transposition cipher convert the following plain text to cipher text. Using key ZQPBEXC.
(c) What is Cryptography ? Explain two cryptographic principles.
b) Using columnar transposition cipher convert the given plain text to cipher text.
Plaintext : COMMUNICATIONMUSTBESECURE, Key = FASTER
a) Using columnar transposition cipher, convert following plaintextto ciphertext. ‘allthepacketsfromporttenareallowed”, key=”COMPUTER”
c) What is Electronic Code Book (ECB), write it’s advantages and disadvantages.
b) Explain symmetric key cryptography.
a) Define i) Plain Text ii) Cipher Text
iii) Encryption iv) Decryption
Chapter 4 Security in the Internet
1 mark
e) What is VPN (Virtual Private Network)?
g) Write advantages of packet filter firewall.
Q. What is packet filter./
b) What is firewall? Explain packet firewall.
c) Explain in detail packet filter firewall, also write it’s advantages and disadvantages.
j) A proxy firewall is also called application gateway. Write true or false and also justify.
(g) What is Role of packet filter ?
2 mark
a) What is firewall? Explain with diagram.
e) Write note on IPSec modes.
h) What is the purpose of IPSec?
(ii) List and explain the fundamental services offered by DNSec
i) Write name of protocols on which IKE (Internet Key Exchange) is based.
b) Write note on Real-Time Transport protocol (RTP).
4 mark
a) Explain PGP certificates.
b) Explain SSL services in detail.
(a) Explain four cases on ARP.
(f) State true or false—ARP replay is unicast.
c) Explain dynamic and static address mapping in ARP. [2]
c) Explain RARP. What are its advantages and disadvantages.
c) What is sampling?
d) What is sampling?
e) Explain active web document.
b) Convert dotted decimal IP address to binary address 255.255.0.0
a) What is the use of TTL field in IPv4.
(i) State the purpose of the LLC Layer.
(2) Write a note on Java applet security.
(b) What are the types of the HTTP services ?
About Abhishek Dhamdhere
Qna Library Is a Free Online Library of questions and answers where we want to provide all the solutions to problems that students are facing in their studies. Right now we are serving students from maharashtra state board by providing notes or exercise solutions for various academic subjects
No comments:
Post a Comment