Cryptography and Network Security Unit I - Fundamentals Part-A (2 Marks)
Cryptography and Network Security Unit I - Fundamentals Part-A (2 Marks)
UNIT I - FUNDAMENTALS
PART-A (2 MARKS)
PART-B
PART-A (2 MARKS)
PART-B
PART-A (2 MARKS)
PART-B
1. Define Kerberos.
2. What is Kerberos? What are the uses?
3. What 4 requirements were defined by Kerberos?
4. In the content of Kerberos, what is realm?
5. Assume the client C wants to communicate server S using Kerberos
procedure. How can
it be achieved?
6. What is the purpose of X.509 standard?
7. What are the services provided by PGP services.
8. Explain the reasons for using PGP?
9. Why E-mail compatibility function in PGP needed?
10. Name any cryptographic keys used in PGP?
11. Define key Identifier?
12. List the limitations of SMTP/RFC 822?
13. Draw the diagram for PGP message transmission reception?
14. What is the general format for PGP message?
15. Define S/MIME?
16. What are the elements of MIME?
17. What are the headers fields define in MIME?
18. What is MIME content type and explain?
19. What are the key algorithms used in S/MIME?
20. Give the steps for preparing envelope data MIME?
21. What you mean by Verisign certificate?
22. What are the function areas of IP security?
23. Give the application of IP security?
24. Give the benefits of IP security?
25. What are the protocols used to provide IP security?
26. Specify the IP security services?
27. What do you mean by Security Association? Specify the parameters that
identifies the
Security Association?
28. What does you mean by Reply Attack?
29. General format of IPsec ESP Format?
30. Differentiate Transport and Tunnel mode in IPsec?
31. What is Authentication Header? Give the format of the IPsec
Authentication Header?
32. Explain the format of ESP Transport Mode?
33. Define Transport Adjacency and Iterated Tunnel?
34. Give features and weakness of Diffie Hellman?
35. Explain man in the middle attack?
36. List the steps involved in SSL record protocol?
PART-B
PART-A (2 MARKS)
PART-B
1. Explain the technical details of firewall and describe any three types of
firewall with neat
diagram . (16)
2. Write short notes on Intrusion Detection. (16)
3. Define virus. Explain in detail. (16)
4. Describe Trusted system in detail. (16)