0% found this document useful (0 votes)
36 views

Network Basics and Network Security - Set1

Uploaded by

anb.jaipur19
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Network Basics and Network Security - Set1

Uploaded by

anb.jaipur19
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Roll number: ___________

Unique Paper Code :


Name of the Course : Post Graduate Diploma in Cyber Security and Law
Name of the paper :
Semester : I
Duration : 2 Hours
Maximum Marks : 40

Instructions for Candidates

1. Write your Roll No. on the top immediately on receipt of this question paper.

2. Attempt any four questions out of 6 questions.

3. Parts of a question must be answered together

Q.1 (a) Discuss the different types of computer networks commonly used in modern (2)
computing environments.

(b) Discuss the role of DHCP servers in network administration and address (2)
assignment. Explain how DHCP works and the benefits it provides in
managing IP addresses dynamically within a network.

(c) Describe the function of DNS servers and the process of resolving domain (2)
names to IP addresses. Additionally, discuss the importance of DNS security
and common DNS-related attacks, along with mitigation strategies.

(d)10. Explain the purpose of network devices at Layer 1, Layer 2, and Layer 3 of (2)
the OSI model. Provide one example of each device.

(e) Describe the importance of alerts and audit trails in network security. How (2)
do they help in detecting and mitigating security incidents?

Q.2 (a) Discuss the concept of Virtual Private Network (VPN) and its types. Explain (1)
the benefits of using a VPN in a corporate environment.

(b) You are a network administrator tasked with designing a subnet for a (4)
company network. The network must support at least 50 hosts. Design an
appropriate subnet mask and subnet the given IP address range efficiently.
IP Address Range: 192.168.1.0/24

(c) Define the difference between symmetric and asymmetric encryption (2)
algorithms.

(d) Describe three different types of network layer attacks commonly (3)
encountered in cybersecurity.

Q.3 (a) List one network device at each layer of the OSI model and describe its (2)
function

(b) Define network policies and their importance in network security (2)
management. Discuss two key components of a network security policy.

(c) Define DNS poisoning and ARP poisoning attacks. Explain the impact of (2)
these attacks on network communication and security.

(d) Discuss common router attacks and their potential impact on network (2)
security. Outline three best practices for securing routers against attacks.

(e) Explain the concept of VPN pentesting. Discuss the steps involved in (2)
conducting a VPN penetration test and identifying vulnerabilities in VPN
implementations.

Q.4 (a) Describe the process of conducting network scanning using tools such as (2)
Nmap or Nessus to discover active hosts and open ports on the network.

(b) Explain how you would enumerate network services running on discovered (2)
hosts, including protocols, banners, and response characteristics.

(c) You are tasked with performing a network vulnerability assessment for a (3)
small-to-medium-sized business network. The network consists of routers,
switches, servers, and workstations running various operating systems.
Develop a plan outlining the steps you would take to conduct the assessment

(d) What is vulnerability scanning? (1)

(e) Define NAT (Network Address Translation) and describe its role in modern (2)
networking.

Q5 (a) Explain the concept of network exploitation in cybersecurity. Discuss the (4)
objectives and techniques used by attackers to exploit vulnerabilities in
network systems. Provide examples of common network exploitation
scenarios.

(b) How does Nmap distinguish between open ports and closed ports during a (2)
scan?

(c) What features does the Metasploit Framework offer for evading anti-viruses (2)
and firewalls?

(d) How does the Metasploit Framework help security professionals assess and (2)
mitigate network vulnerabilities?

Q.6 (a) Discuss the challenges and limitations of evading firewalls and anti-virus (2)
systems during network exploitation.

(b) What role does reconnaissance play in the network exploitation process? (2)

(c) How does the Metasploit Framework help security professionals assess and (2)
mitigate network vulnerabilities?

(d) Explain the importance of network vulnerability assessments in (2)


cybersecurity.

(e) Explain the significance of Nmap in network scanning and enumeration. (2)

You might also like