Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
38 views
3 pages
Security Full Question Bank
Uploaded by
18104 MD SHANJID AREFIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Security Full Question Bank For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
38 views
3 pages
Security Full Question Bank
Uploaded by
18104 MD SHANJID AREFIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Security Full Question Bank For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Security Full Question Bank For Later
You are on page 1
/ 3
Search
Fullscreen
om ‘Time: NB. 6 KHULNA UNIVERSITY OF ENGINEERING & TECIINOLOGY B.Sc. Engineering 4" Year 1* Term Examination, 2021 Department of Computer Science and Engineering CSE 4115 Computer and Network Security ILL MARKS: 210 hours Answer ANY THREE questions from each section in separate seripts. Figures in the right margin indicate full marks. Section A (Answer ANY THREE questions from this section in Script A) . a) Explain the terms: ‘Security services’, ‘Cryptosystem’, ‘Cryptoanalysis’ along with the major (13) goals of security, Also explain a conventional eryptosystem by using a proper diagram. ’) Specify Shannon characteristics to explain good ciphers along with ‘confusion’ and (14) ‘diffusion’, Using a block diagram depict the symmetric eryptosystem along with the ways of the key distribution. ©) Discuss the benefits of an asymmetric cryptosystem. For RSA algorithm from (08) ed = 1 mod gn) show that fora single value of , there may exist many values of d, where symbols have their usual meanings. . a) Define chosen-plaintext attack. Show how RSA elgorithm suffers with tis attack. 08) 'b) Explain the working procedure of Caesar cipher. How itis an example of substitution ciphers. (07) ©) Discuss the properties of digital signatures. RSA algorithm can be used to implement product (10) cipher. How? Show it? 4) Discuss the techniques, pros and cons of block and stream ciphers. What are the trends of (10) maintaining security? Explain them. 8) Explain the working procedure of ElGamal encryption algorithm. Why it is said to be a (13) probabilistic encryption algorithm? Explain. b) Explain ElGamal digital signature algorithm in detail. Also give a working example oft. (13) ©) Discuss the major characteristics of cryptographic hash function? Why itis one-way? (09) ©) Discuss the characteristics of good viruses. (5) Section (Answer ANY THREE questions from this section in Seript B) . a) What is segmentation fault? Explain Buffer Overflow attack with proper code and stack (15) diagram. ) Show how Integer Overflow attack compromises a program’ reliability and security. as) ©) Explain document virus using Microsoft’s Dynamic Data Exchange (DDE) protocol. (05) 4) What are the problems associated with Segmentation and Paging? Explain how Paged (15) ty EsBinn some countrmessies tht are ued aginst Buller Overflow atack as) ©) What is format string? 3) . a) Explain attacks on format string vulnerability. as b) Write short notes on the followin, a i) DHCP Spoofing Attack, Gi). Rainbow Table Attack. Gi) Polymorphic Viruses. (iv) Dictionary Attack. ©) What are covert channels? Differentiate between errors and faults. (08) 8) How does viruses attach with original programs? a0) ») Explain the working principle of Elliptic Curve Cryptography (ECC). What are the reasons to (10) prefer ECC over RSA? ©) What is salt? How does it help against Rainbow Table attack and make password hashing (10) ‘more secure? 4) Explain SQL injection and web bug. (03) Page: 1 of 1ae A Universiry ‘OF ENGINEERING & TECHNOLOGY ” ne ‘ngineeriag 4 Year * Term Examination, 2019 partment of Computer Science and Engineering CSE 4115 Computer and Network Security NB. i) Answer ANY THREE questions from each section in separate scripts. ii) Figures in the right margin indicate full marks. ‘Secmioy A (Answer ANY THREE questions from ths seetion in Script A) 1. 8) Define the terms: ‘confusion’, ‘diffusion’, ‘eryptography" and ‘cryptanalysis’. Discuss Shannon characteristics of good cipher. ) ‘RSA isa commutative lke crypiosystem’ — how? Explain deliberately. «¢) Define exypiosystem. Discuss about the ingredients of eryptosystem. 6) Define “kzown- plaintext’ attack. How this attack ean mount over RSA‘ amal digital signature algorithm with 2. a) Discuss characteristics of digital signature, Explain EIG: mexample. ; in +) Digital signarere and public key cryptography can be combined why and bow? Explain, ) Using an example explain ElGamal exyptosystem. How does it relate with discrete logan problem? 6) Discuss threats to e-mail. 13) Discuss ‘stream cipher" and “block cipher’. Explain a specific Key exchange protocol 10 isribute akey. » ©) Define sx sensitive. 4, 3) What is meant by bomomorphic encryption? Show that RSA ard ElGamal eryptosystems are omomorphic. ) What are the param D ¢) Discuss the dimensions of reliability and integri database security? Explain them. eters that make a computer network vulnerable? Discuss them briefly. ity of database. What are the requirements for Seeri (Answer ANY THREE questions from this section in Seript B) ‘5, a) What is salt and how does it make password hashing more secure? Also explain rainbow table ttack and how salt can help against rainbow table attack. ) How does the attacker know what algorithm and salt to use in a dictionary attack? ¢) Explain Buffer Overflow attack with proper code and stack diagram. Also discuss about the countermeasures that are used against Buffer Overflow attack. 6. 8) Explain how Format String attack works with appropriate activation record diagrams. Also explain different uses of Format String attack with proper example(s) and stack diagrams, ») Demonstrate Integer Overflow attack using suitable example(s). ©) Explain SQL Injection attack with practical example. Also discuss about the prevention techniques used against SOL Injection attack. 7. a) Explain Persistent, Reflected and DOM-based Cross-Site Scripting (XSS) attacks with examplets). +b) Explain the methods of preventing XSS attacks, ©) What are web bugs? Explain how attackers bypass CAPTCHA protection. 8, 2) Explain how combining Paging with Segmentation provides better performance for protection in general purpose operating system compared to using them separately. 'b) What is a Covert Channel? How to create Covert Channels? ) Briefly explain the following attacks: (i) Ransomware, (ii) Salami Attack, (i (iv) Document virus using Microsoft's Dynamic Data Exchange. 4) What is Access Control Directory? ‘Tepjacking, ‘TOE: 3 hours FULL MARKS: 210 (12) (08) (08) ) «a2 (08) (0) (05) a3) (3) (09) ao) (10) cc) (05) as) (06) aa) (as) 07) a3) as) (10) (10) (09) (06) (16) (04) Page: 1 of 1KHULNA UNIVERSITY OF ENGINEERING & TECHNOLOGY BSc. Engineering 4° Year 1* Term Examination, 2018 De t Science and Engineering 1s Computer and Nework Security ‘Tine: 3 hours Fun Marxs: 210 NB. i) Answer ANY THREE questions from each section in separate scripts ii) Figures in the right margin indicate full marks. SecTiow A (Answer ANY THREE questions from this section i teristics of good cipher. Define the terms: (10) ‘pt AY 1, a) Through Shannon characteristics, discuss the cl “confusion” and“iffsion' : . won ') Define known plaintext atack, How it canbe associate with RSA eryptosystems? ue 6) On sane modults using RSA, bow multiple paris an encrypt ata? > € Show that “RSA eryptosystem is omomomphis". 2 a) Diseuss propenties of dig signature, Explain EIGamal digital signature algorithm witha 2) example . » 1) aad the working procedure of EIGamal eyposytem spesihing tht itisbasedondscste (10) Mal 2 f wo 3. a) Define cryptographic hash function. Discuss properties oft _ " 2 Pears arehyiyeu combine digital signaure and pubic hey crgptogranhy? Explain. es 2} Discus the parameters that make a computer network wulaerable. uo 18) Define sensitive data, Discuss the factors that ean make data sen 44 8) How documents can be signed using public hey ergptogranhy and one way hash function? (07) Discuss. 3 by Discuss ‘stream cipher’ and “block cipher’, Explain a specific Key exchange protosel 19 (13) distribute a key. os ) How ‘primitive element” relates with ElGamal? (@s) {d) What are the requirements of database security? Explain them. on) SecTioN B (Answer ANY THREE questions from this section in Script B) 5, a) Given intuitive explanation of the working principle of Elliptic Curve Cryprography (ECC), (13) ‘Also explain how encryption and decryption work in ECC. by Explain ECC based digital signature with mathematical proof, 1) ©) What are the reasons to prefer ECC over RSA? (3) What is tapjacking? Explain the prevention mechanism used against tapjacking in context of (07) ‘Android operating system. 6. a) Write short notes on following attacks: a6) age-in-the-Middle. ii, Program Download Substitution, iii, SQL Inject iv, Man-in-the-Browser. 'b) Explain how attackers use User-in-the-Middle attack to bypass CAPTCHA protection. (08) ©) What are web bugs? Explain how websites can be protected against unwanted change both (13) from administrator's and users" perspect 7. a) With appropriate code and stack diagram explain how Buffer Overflow can be exploited to (18) execute attacker's provided code. Also explain some common counter measures that are used against Buffer Overflow attack, +b) Explain the uses of Format String attack with appropriate example(s) and stack diagrams, (11) ) Explain Integer Overflow attack using suitable example(s). (06) 8. a) Write short notes on the followings: 5) i, Salami Attack. ii, Cover Channel. Document Virus using Microsoft's Dynamie Data Exchange (DDE). ') Explain the problems associated with Acc rectory. (06) °) us)
You might also like
( - )
PDF
No ratings yet
( - )
248 pages
ভারতকোষ_-_প্রথম_খণ্ড
PDF
No ratings yet
ভারতকোষ_-_প্রথম_খণ্ড
698 pages
Bharater Nritattwik Parichay
PDF
No ratings yet
Bharater Nritattwik Parichay
321 pages
Information Security Question Bank
PDF
No ratings yet
Information Security Question Bank
5 pages
Machine Learning Full Question Bank
PDF
No ratings yet
Machine Learning Full Question Bank
14 pages
(All Slide in One) Peripherals & Interfacing - CSE 3103 - Noyon Sir
PDF
No ratings yet
(All Slide in One) Peripherals & Interfacing - CSE 3103 - Noyon Sir
43 pages
CNS-Question Bank-All Units
PDF
No ratings yet
CNS-Question Bank-All Units
9 pages
Computer System Security KNC 301
PDF
No ratings yet
Computer System Security KNC 301
2 pages
QP14 Network Security
PDF
No ratings yet
QP14 Network Security
2 pages
Ics Question Paper
PDF
No ratings yet
Ics Question Paper
28 pages
Security Full Question Bank
PDF
No ratings yet
Security Full Question Bank
3 pages
Information Assurance & Network Security
PDF
No ratings yet
Information Assurance & Network Security
2 pages
Cryptography Question Bank
PDF
No ratings yet
Cryptography Question Bank
3 pages
CNS Qbank
PDF
No ratings yet
CNS Qbank
4 pages
Cryptography Quest Bank 02
PDF
No ratings yet
Cryptography Quest Bank 02
7 pages
Cryptography and Network Security QB
PDF
No ratings yet
Cryptography and Network Security QB
7 pages
Css All Pyq (Till Date)
PDF
No ratings yet
Css All Pyq (Till Date)
28 pages
Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester
PDF
No ratings yet
Computer Engineering Department: Gtu Important Questions Bank Subject Name: Information Ecurity Subject Code Semester
5 pages
Cns
PDF
No ratings yet
Cns
6 pages
QP9 CNS QP
PDF
No ratings yet
QP9 CNS QP
2 pages
Question Bank
PDF
No ratings yet
Question Bank
5 pages
Nov Dec 2020 CCS QnPaper
PDF
No ratings yet
Nov Dec 2020 CCS QnPaper
3 pages
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
PDF
No ratings yet
CSE-ND-2022-CS 8792-Cryptography and Network Security - 892070682-ND22CS
3 pages
RT 41051102018
PDF
No ratings yet
RT 41051102018
4 pages
Cryptography Question-Bank
PDF
No ratings yet
Cryptography Question-Bank
5 pages
NSP-PQP (Not Exact Syllabus)
PDF
No ratings yet
NSP-PQP (Not Exact Syllabus)
8 pages
Cryptography and Network Security
PDF
No ratings yet
Cryptography and Network Security
8 pages
CA Syllabus
PDF
No ratings yet
CA Syllabus
12 pages
CSS 2024 Question Paper (Analysis)
PDF
No ratings yet
CSS 2024 Question Paper (Analysis)
4 pages
CSE-ND-2020-CS 8792-Cryptography and Network Security-488165205-CS8792 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
No ratings yet
CSE-ND-2020-CS 8792-Cryptography and Network Security-488165205-CS8792 CRYPTOGRAPHY AND NETWORK SECURITY
3 pages
Nov Dec 2019
PDF
No ratings yet
Nov Dec 2019
4 pages
21CS1701 - CNS-QB
PDF
No ratings yet
21CS1701 - CNS-QB
37 pages
2010 - .May - June-2010
PDF
No ratings yet
2010 - .May - June-2010
1 page
Uka Tarsadia University
PDF
No ratings yet
Uka Tarsadia University
2 pages
CRYPTOGAPHY
PDF
No ratings yet
CRYPTOGAPHY
4 pages
KTU S7 Elective: CST433 Security in Computing
PDF
No ratings yet
KTU S7 Elective: CST433 Security in Computing
8 pages
Cryptography Network Security Sep Oct 2022
PDF
No ratings yet
Cryptography Network Security Sep Oct 2022
2 pages
Assignment CNS
PDF
No ratings yet
Assignment CNS
2 pages
CNS Question Bank (1-5)
PDF
No ratings yet
CNS Question Bank (1-5)
2 pages
CNS Unitwise Important Topics - Imp
PDF
No ratings yet
CNS Unitwise Important Topics - Imp
10 pages
CNS Prev
PDF
No ratings yet
CNS Prev
10 pages
Cst433 Security in Computing, May 2024
PDF
No ratings yet
Cst433 Security in Computing, May 2024
2 pages
Kcs074 Cryptography and Network Security
PDF
No ratings yet
Kcs074 Cryptography and Network Security
2 pages
QB - CSE803 - Cryptography and Network Security
PDF
No ratings yet
QB - CSE803 - Cryptography and Network Security
13 pages
20ECSC402 851 20ECSC402 862 Template-21KLE25
PDF
No ratings yet
20ECSC402 851 20ECSC402 862 Template-21KLE25
3 pages
CNS Imp Questions CNS Imp Questions
PDF
No ratings yet
CNS Imp Questions CNS Imp Questions
7 pages
Cryptography Network Security Nit 701
PDF
No ratings yet
Cryptography Network Security Nit 701
2 pages
20ecsc402-B 851 20ecsc402-B 862 22kle797
PDF
No ratings yet
20ecsc402-B 851 20ecsc402-B 862 22kle797
1 page
20ecsc402 851 20ecsc402 898 20kle50
PDF
No ratings yet
20ecsc402 851 20ecsc402 898 20kle50
4 pages
20ecsc402 851 20ecsc402 898 20ecsc402 21kle732
PDF
No ratings yet
20ecsc402 851 20ecsc402 898 20ecsc402 21kle732
2 pages
III Cse Cb3491 Ccs QB Unit 1
PDF
No ratings yet
III Cse Cb3491 Ccs QB Unit 1
3 pages
CSS Answer Bank (Repeated Qns Only)
PDF
100% (1)
CSS Answer Bank (Repeated Qns Only)
52 pages
Cns Question Bank (Des&Obj)
PDF
No ratings yet
Cns Question Bank (Des&Obj)
12 pages
20ecsc402 851 20ecsc402 862 22kle96
PDF
No ratings yet
20ecsc402 851 20ecsc402 862 22kle96
2 pages
Question bank-CNS
PDF
No ratings yet
Question bank-CNS
6 pages
Cryptography NetworkSecurity Aug Sep2023
PDF
No ratings yet
Cryptography NetworkSecurity Aug Sep2023
2 pages
IS Question Bank
PDF
No ratings yet
IS Question Bank
4 pages
Cryptography and Network Security Predicted
PDF
No ratings yet
Cryptography and Network Security Predicted
5 pages
Css Previous Year Questions All
PDF
No ratings yet
Css Previous Year Questions All
10 pages
Cy PT Ography
PDF
No ratings yet
Cy PT Ography
2 pages
CNS Question Bank
PDF
No ratings yet
CNS Question Bank
6 pages
Crypto Paper
PDF
No ratings yet
Crypto Paper
3 pages
Cns Previousyear Questionpapers
PDF
No ratings yet
Cns Previousyear Questionpapers
6 pages
Instructions To The Students
PDF
No ratings yet
Instructions To The Students
7 pages