CNS Viva QA
CNS Viva QA
1. What is Cryptography?
Cryptography is the technique of securing information and communication using codes. It ensures
The main principles are confidentiality (data secrecy), integrity (data accuracy), availability,
Security attacks are divided into passive (eavesdropping) and active attacks (modification,
Symmetric key cryptography uses a single key for encryption and decryption, while asymmetric
5. What is Steganography?
Steganography is the practice of hiding messages or data within other formats like images or
Block ciphers encrypt fixed-sized blocks of plaintext using substitution and permutation methods
DES is a symmetric key algorithm with a 56-bit key and 64-bit block size, performing 16 rounds of
AES is a secure block cipher supporting 128, 192, or 256-bit keys and uses SubBytes, ShiftRows,
RSA is an asymmetric algorithm that encrypts and decrypts data using public and private keys
It is a key exchange protocol where two parties securely generate a shared secret key over a
Hash functions take an input and produce a fixed-length hash value, ensuring data integrity and
detecting changes.
SHA algorithms, like SHA-1 and SHA-256, produce hash values (160-bit or 256-bit) to ensure
HMAC uses hash functions like SHA for authentication, whereas CMAC uses symmetric block
Digital signatures provide authentication, integrity, and non-repudiation by signing data with the
5. What is Kerberos?
Kerberos is a secure network authentication system that uses tickets to verify users and services
in a distributed environment.
1. What is SSL/TLS?
SSL/TLS are protocols that secure communication between devices on a network by encrypting
HTTPS combines HTTP with SSL/TLS encryption to ensure secure communication between a
Wireless security standards include WEP (weak), WPA (stronger with TKIP), and WPA2
PGP is used to secure emails by encrypting the content and providing digital signatures to ensure
2. What is S/MIME?
S/MIME is an email security standard that encrypts emails and provides digital signatures for
message authentication.
XSS is a vulnerability where malicious scripts are injected into trusted websites to steal user data.
SSO allows users to log in once and gain access to multiple applications or systems without