Important Questions
1. What is security attack? Explain the general categories of attack with example of each.
2. Explain the terms.
i) Confidentiality
Authentication
iii) Integrity
3. What is DES? Explain Encryption and key generation algorithm for DES with suitable
diagram.
Solve any two
4. What is Key Distribution? Explain with help of diagram.
S.Define Kerberos and name its servers. Briefly explain the duties of each server.
What is Digital signature? Explain in detail.
6.Draw and Explain fields in IPSec Authentication Header.
7.What is Secure Socket Layer (SSL)2 Define the different parameters used in session and
connection states.
What is SNMP? Explain role of SNMP with the help of diagram.
8.What is Intrusion Detection ? Explain Distributed Intrusion Detection in detail.
9.Explain password selection strategies in detail.
10. Explain types of Viruses in detail.
any two types with the help of diagram.
11. What are the different types of firewalls? Discuss
Netwok Security Model indetail.
12. What is Netwok Security? Explain the
Services.
13. Explain the Six terms of Security
Encryptions algorithm? Explain DES algorithm with the help of
14. What is Conventional
diagram.
algorithm where public key =(7.187}:
15. Preform encryption and decryption using RSA
private key={23.187} M=88.
Briefly explain the duties of each server.
16.What is Kerberos model and name its servers.
Explain in detail.
17. What is Digital signature?
IPSec Authentication Header
18. Draw and Explain fields in
19.What is Secure Socket Layer (SSL)? Define the
connection statcs. different parameters used
in sessi0n and
20. Using DES algorithm encrypt-decrypt
the following sequence
C-E(K3.D(K2,E(K 1.P))
Where C=Cipher text
P= Plain text
21.What is Intrusion Detection System? Explain
detail. Distributed Intrusion Detection
system in
22.What is proxy? Why it developed? Explian the
protocol architecture involving proxy.
23. Explain types of Viruses and
worms in detail.
24. What is firewall? What are the
the help of diagram. different types of firewalls? Discuss any two types
with
25. What is Security Attack? Explain the
various security attacks in detail.
26.What is Network Security? Draw and Explain
27. Draw and Explain Feistel Network Network Accsess Security model.
L16-R15 and R16=L15 XOR F(R15.K16) Structure for the given equation.
28.Discuss public key encryption structure. Give diagrammatic
and authentication. representationof encryption
29. Give difference between Kerberos
Version 4 and Version 5.
30. Describe IPSec document detail.
31.What is Proxy? Why it is developed? Explain protocol architecture
involving proxy.
32.What is a Secure Electronic Transaction (SET) Explain key feature
of SET in detail?
33. What is Rule based Intrusion Detection? Explain in detail.
34. Explain the following terms
i) Backdoor
ii) Logic Bomb
iii) Trojan Horses
35. Draw and Explain Packet filltering firewall and compaire it with
firewall.
application-level
36. Explain the concept of trusted system in detail.
37. What is Security Threats? Explain the various security services in detail.
38. What is Conventional Encryptional model? Draw and Explain Network
Security model.
39. Drawand Explain Feistel Network Structure for the given equation.
Ll6-RI` and
gio LIS \ORT
(RI5.Kl6).
40 Preform encr ption and
pmvate key (23.187;M-88 decy ption using RSA algorithm where public key =(7,187}:
41. Whal is
Version 5. Kerbetos Give difference betwcen Kerberos Version 4and
42.Draw and Explain the
|PSccurity architecture and Authentication Header.
43. What is
Secure
connecuon states. Socket Layer (SSL)? Define the diflerent parameters used in session and
44. Using DES algorithm
C-E(K3.C-Cipher
D(K2.E(K1. encrypt-decrypt thc following sequence
Where text P))
P= Plain text
45. Draw and Explain
different
46. Explain the concept of trustedtypes of firewall.
system
47. How IS encryption misused to attack thein detail.
detail. system? Elaborate various security services in
48. What is Conventional Encryptional model? Draw and Explain
Network Security model.
49. Draw and Explain Feistel Network Structure for the given
L16-R15 and equation.
R16-LI5 XOR F (RI5, K16).
Solve any two
S0. Preform encryplion and decryption using RSA algorithm where public key = (7,187};
private key-(23.187} M-88.
51. What is KDC? Elaborate PGP Cryptographic functions with the help of diagram.
52. What is Kerberos? Give difference between Kerberos Version 4 and
Version 5.
53.Draw and Explain the IPSecurity architecture and Authentication Header.
54. What is Secure Socket Layer (SSL)? Define the different parameters used in session and
Connection states.
55. Using DES algorithm encrypt-decrypt the following sequence
C-E(K3.D(K2,E(K1.P))
Where C-Cipher text
P= Plain text
56. What is Host based Intrusion Detection? Explain in detail.
57. Explain the following terms
i) Backdoor
ii) Logic Bomb
ii) Trojan Horses
DÓ. Why firewall is available in transport laver? Draw and Explain hybrid firewall.
S9. Which are the four basic techniaues of choosing password? Compare their relative merits.
Active Atacks with examples.
0 Wnatl are d1fferent types of security attacks2 Elaborate
O1. Derine the following Terms: i) Cryptography Cryptology i) Cryptanalysis i) Encryption
iv) Transposition Cipher v) DES vi)AES.
Elaborate the TCP/IP Stack Model with diagrams.
63. Elaborate in Brief 3DES algorithm and using DES algorithms encrypt-decryptthe 0+.
Tollowing sequence C-E (K3, D (K2, E (KI. P) where C=Cipher text P= Plain text
04.How 1S encryption misused to attack the system? Elaborate Elliptic Curve based
Crypiography.
65.Elaborate working of Diffie Hellman Key Exchange Algorithm with example.
66.Comparison of AES with others ciphers (DES, Triple DES) private key for
67. The parameters given are: p=5, q=17, Find out the possible public key and
RSA Algorithm. Also encrypt the message *4"
68. Elaborate the Secure Hash algorithm. and Version
69. Elaborate X.509 Certificates? Give difference between Kerberos Version 4
5.
connection states
70. Elaborate IPSec. Define the different parameters used in session and
with SSL.
and explain
71. Why application-level gateways firewall is available in transport layer? draw
circuit level gateways firewall.
72. Elaborate is Host based Intrusion Detection? Explain in detail.