0% found this document useful (0 votes)
6 views

NSS Solved Question Bank

The document is a solved question bank on Network and System Security (NSS) covering key concepts such as network security, security principles, types of attacks, security services, cryptography, and mechanisms like firewalls and VPNs. It emphasizes the importance of confidentiality, integrity, and availability in protecting data and systems from various threats. Additionally, it discusses frameworks like PKI and zero trust architecture, along with the differences between various security methods and attacks.

Uploaded by

chayankayal63
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

NSS Solved Question Bank

The document is a solved question bank on Network and System Security (NSS) covering key concepts such as network security, security principles, types of attacks, security services, cryptography, and mechanisms like firewalls and VPNs. It emphasizes the importance of confidentiality, integrity, and availability in protecting data and systems from various threats. Additionally, it discusses frameworks like PKI and zero trust architecture, along with the differences between various security methods and attacks.

Uploaded by

chayankayal63
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Network and System Security (NSS) - Solved Question Bank

1. Define network security and explain why it is important.


Network security protects systems from attacks. It ensures confidentiality, integrity, and availability of data,
preventing unauthorized access and cyber threats.

2. What are the basic principles of security?


Confidentiality: Restricts access. Integrity: Ensures data accuracy. Availability: Ensures resources are
accessible. Authentication: Confirms identity. Non-repudiation: Prevents denial of actions.

3. Describe different types of security attacks with examples.


Passive (eavesdropping), Active (DoS, malware), Insider attacks, and Man-in-the-Middle.

4. What are security services? List and explain any three.


Authentication (verifies identity), Confidentiality (protects data), Integrity (ensures accuracy).

5. Differentiate between passive and active attacks.


Passive: Monitoring traffic (e.g., eavesdropping). Active: Modifying/disrupting data (e.g., DoS).

6. Explain the need for security in computer networks.


Security prevents data breaches, financial loss, and service disruption.

7. What is a security mechanism? Provide examples.


A process enforcing security policies. Examples: Encryption, firewalls, IDS.

8. Discuss the CIA triad.


Confidentiality (data privacy), Integrity (prevents tampering), Availability (ensures access).

9. Difference between authentication and authorization.


Authentication: Verifies identity. Authorization: Grants access rights.

10. Describe different types of attacks.


DoS (overloads systems), Phishing (steals data), MitM (intercepts communication), SQL Injection (database
attack).

11. What is cryptography?


Encryption technique securing communication, ensuring confidentiality and integrity.

12. Difference between symmetric and asymmetric encryption.


Symmetric: Single key (e.g., AES). Asymmetric: Public-private key pair (e.g., RSA).

13. Explain non-repudiation.


Ensures a sender cannot deny an action. Used in digital signatures.
14. Describe firewalls.
Security mechanism filtering network traffic, blocking unauthorized access.

15. What is a model for network security?


Defines security policies and mechanisms like firewalls, IDS, monitoring.

16. Explain digital signatures.


Ensures data authenticity using encryption (private key signing, public key verification).

17. Describe PKI.


Framework for managing digital keys and certificates for secure communication.

18. IDS vs. IPS.


IDS detects threats; IPS prevents/block threats in real-time.

19. Zero trust architecture.


Requires authentication at every step, continuous monitoring, least privilege access.

20. How does a VPN work?


Encrypts traffic, prevents eavesdropping, secures communication with tunneling protocols.

21. Wireless security mechanisms.


WPA3 (Wi-Fi encryption), AES encryption, MAC filtering to restrict access.

You might also like