Pages

UNIT WISE QUESTION BANK For IS

skyupsworkshops  /  at  22:07:00  / 


18. UNIT WISE QUESTION BANK
Unit-1
1. Define a Security attack. Explain in detail about the various types of attacks an
Internetwork is vulnerable to.
2. Define Information Security and explain its significance in today’s world. Also clearly
bring out the meaning of the following related terms: Computer Security, Network
Security and Internet Security with relevant examples.
3. Discuss the following terms in detail with relevant examples:
a. Interruption ii. Interception iii. Modification iv. Fabrication
4. Explain the different types of security attacks, security services and mechnasims?
5. Discuss Network security model with neat illustration and explain the components of
the model.
6. Explain the substitution techniques a) Ceaser Cipher b) Play Fair Cipher c) Hill Cipher
7. Explain the transposition technique.
8. Compare and contrast between Cryptography and Cryptology.
Unit 2
1. With a neat block diagram explain the DES algorithm?
2. Explain Blowfish algorithm.
3. With neat illustration explain Advanced Encryption Standard algorithm (AES).
4. Write short notes on: (a) Location of encryption devices (b) Fiestel cipher structure
5. Differentiate between DES and AES algorithms.
6. Enumerate the various cipher block modes of operation.
7. Explain the various Key distribution methods
8. Explain the structure of the Conventional Public-key encryption with relevant
illustrations.
9. Describe the approaches of key distribution in public key cryptosystems
10. Explain RSA Algorithm
11. Explain about Diffie Hellman Key Exchange
Courtesy Geethanjali institutions
218
UNIT-3
1. Explain the importance of Secure Hash functions with relevant examples.
2. Describe the various approaches of message authentication?
3. Explain the MD5 algorithm
4. Explain the various steps involved in the HMAC algorithm
5. Explain the Secure Hash Algorithm (SHA-1) in detail
6. Describe Kerberos?
7. Explain the types of digital signature.
8. Explain DSS
9. Explain X.509 authentication service
10. Discuss Biometric Authentication.
UNIT-4
1. Clearly explain in detail the Multipurpose Internet Mail Extensions (MIME).
2. Explain the general format of a PGP message with a pictorial representation.
3. Describe the five principal services that Pretty Good Privacy (PGP) provides
4. Explain PGP (Pretty Good Privacy)?
5. Discuss the features of S/MIME?
6. What is R64 conversion? Why is R64 conversion useful for an e-mail application?
7. Discuss about the documents regarding IPSec protocol?
8. Explain the benefits of IPSec?
9. Explain tunnel mode and transport mode functionality?
10. Discuss the purpose of SA selectors?
11. Discuss about Oakley key determination protocol?
UNIT-5
1. What are the two levels of alerts? List the alerts under them?
Courtesy Geethanjali institutions
219
2. Discuss how SSL record protocol provides confidentiality and message integrity for
SSL connections?
3. What protocol is used to convey SSL-related alerts to the peer entity? Give the
protocol format? Describe the fields?
4. What is the difference between an SSL connection and an SSL session? List and briefly
explain the parameters that define an SSL session state?
5. Explain the various web security threats?
6. List and explain the SET requirements?
7. Explain the operations of SSL Record Protocol
8. Explain the significance of dual signature in SET
9. What is the structure of a virus?
10. Discuss the two techniques for developing an effective and efficient proactive
password checker?
11. Write short note on intruder?
12. With neat diagrams show the differences between screened host firewall single
homed bastion and screened host firewall dual homed bastion?
13. Explain the principles and limitations of a firewall?
14. Write short notes: a) Firewalls b) Instrusion Detection systems
15. What is a bastion host? List the common characteristics of a bastion host?
16. Discuss in detail different types of firewall?
Courtesy Geethanjali institutions

Share
Posted in: Posted on:

Recent Comments

Copyright © 2013 Skyup's Media. WP Theme-junkie converted by Bloggertheme9
Blogger templates. Proudly Powered by Blogger.