0% found this document useful (0 votes)
77 views18 pages

Ccs354 Network Security QB 2024-2025

The document is a question bank for the Network Security course (CCS354) for the academic year 2024-2025, outlining course outcomes and topics covered in five units. It includes questions categorized into three parts (A, B, and C) that assess students' understanding of cryptography, key management, access control, application layer security, and security practices. The document serves as a resource for evaluating students' knowledge and skills in network security concepts and techniques.

Uploaded by

Janani M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views18 pages

Ccs354 Network Security QB 2024-2025

The document is a question bank for the Network Security course (CCS354) for the academic year 2024-2025, outlining course outcomes and topics covered in five units. It includes questions categorized into three parts (A, B, and C) that assess students' understanding of cryptography, key management, access control, application layer security, and security practices. The document serves as a resource for evaluating students' knowledge and skills in network security concepts and techniques.

Uploaded by

Janani M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

DEPARTMENT OF INFORMATION TECHNOLOGY

QUESTION BANK
SUBJECT CODE: CCS354 YEAR /SEM: III/VI

SUBJECT NAME: Network Security ACADEMIC YEAR:2024-2025

NAME OF THE FACULTY: Ms.V.Shanmugapriya

Course Outcomes
After successful Completion of the Course, the Students should be able to
Course
Outcome No Course Outcomes

Classify the encryption techniques


CO314.1
CO314.2 Illustrate the key management technique and authentication.

CO314.3 Evaluate the security techniques applied to network and transport layer

CO314.4 Discuss the application layer security standards.

CO314.5 Apply security practices for real time applications

Knowledge Level (Blooms Taxonomy)


K Applying
K Remembering K Understanding (Application of
1 (Knowledge) 2 (Comprehension) 3
Knowledge)
K
K Analysing K Evaluating Creating
4 (Analysis) 5 (Evaluation) 6 (Synthesis)

1
UNIT I

INTRODUCTION

Basics of cryptography, conventional and public-key cryptography, hash functions,


authentication,
and digital signatures.

UNIT II

KEY MANAGEMENT AND AUTHENTICATION

Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User
Authentication Using Asymmetric Encryption. 157

UNIT III

ACCESS CONTROL AND SECURITY

Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE
802.1X
Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-
Level
Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security,
HTTPS
standard, Secure Shell (SSH) application.

UNIT IV

APPLICATION LAYER SECURITY

Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail.
Wireless
Network Security: Mobile Device Security

UNIT V

SECURITY PRACTICES

Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management,


Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security.

2
UNIT I -INTRODUCTION

Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,


and digital signatures.

PART - A
Q.NO Questions BT Mark
Topic
Level
1. Define Cryptography. BTL1 2
Basics of cryptography,
2. Differentiate between Encryption and Decryption. BTL1 2
Basics of cryptography,
3. Explain the concept of a Symmetric Key Algorithm. BTL2 2
public-key cryptography,
4. Define a Digital Signature. BTL1 2
digital signatures.
5. What is a Hash Function? BTL3 2
hash functions
6. Discuss the purpose of a Public Key in public-key BTL1 2
public-key cryptography,
cryptography.
7. What is Two-Factor Authentication? BTL3 2
authentication,
8. Explain the importance of Randomness in cryptographic BTL2 2
Basics of cryptography,
algorithms.
9. Describe the role of a Certificate Authority (CA) in digital authentication, BTL4 2
certificates. and digital signatures.

10. Discuss the concept of Nonrepudiation in the context of authentication, BTL1 2


digital signatures. and digital signatures.

11. What is cryptography, and what are its primary BTL3 2


Basics of cryptography,
objectives?
12. Distinguish between conventional and public-key BTL1 2
public-key cryptography,
cryptography.
explain their key characteristics of public key? 2
13. public-key cryptography, BTL2
Differentiate between symmetric and asymmetric 2
Basics of cryptography,
14. encryption. Provide an example of each. BTL2
15. What are the advantages and disadvantages of using BTL4 2
Basics of cryptography,
conventional cryptography?
16. What are the core properties of secure hash functions? BTL6 2
hash functions
17. How the hash function contribute to data integrity? BTL5 2
hash functions
Define authentication authentication, 2
18. BTL5

3
19. Provide three common authentication mechanisms. authentication, BTL6 2

20. What is a digital signature, and how does it ensure non- digital signatures. BTL4 2
repudiation?
21. Explain the concept of digital certificates digital signatures. BTL4 2

22 Role of public-key cryptography. BTL6 2


public-key cryptography,
23 difference between hashing and salting passwords. BTL5 2
hash functions
24 Explain the use of digital signatures in software updates digital signatures. 2
BTL5

25 Explain the use of digital signatures in secure document digital signatures. 2


BTL6
signing.

PART - B
Q.NO Questions BT Mark
Topic
Level
1. Compare and contrast Symmetric Key Cryptography and 13
Basics of cryptography, BTL1
Asymmetric Key Cryptography
2. Examine the steps involved in the creation and authentication, 13
verification of a Digital Signature. and digital signatures. BTL1
3. Discuss the challenges and advantages of implementing 13
public-key cryptography, BTL1
Public Key Infrastructure (PKI).
4. Explore the role of Hash Functions in ensuring data 13
hash functions
integrity in blockchain technology. BTL1
Explain the concept of a Collision in Hash Functions and 13
hash functions
5. its implications. BTL2
Discuss the limitations and potential vulnerabilities of 13
6. public-key cryptography, BTL2
conventional (single-key) encryption.
7. Describe the principles of Kerberos authentication BTL2 13
authentication,
protocol
Examine the importance of Key Management in 13
Basics of cryptography,
8. cryptographic systems. BTL3
Discuss the characteristics of a secure Random Number authentication, 13
9. Generator (RNG). and digital signatures. BTL3

Explore the differences between Message Authentication authentication, 13


10 Code (MAC) and Digital Signatures. and digital signatures. BTL4

4
PART - C
Q.NO Questions BT Mark
Topic
Level
Discuss the design principles of a secure hash function, BTL5 15
1. hash functions
highlighting collision resistance and avalanche effect.
Design a secure communication protocol that 15
incorporates encryption, authentication, and integrity BTL6
authentication,
2. verification. Specify the algorithms or techniques you
would use, explaining their rationale.
Explore the relationship between Cryptography and 15
public-key cryptography,
3. Network Security. BTL5
Discuss the applications and challenges of cryptographic BTL6 15
public-key cryptography,
4. techniques in the Internet of Things (IoT).
5. Critically evaluate the ethical considerations surrounding BTL3 15
the use of cryptography in various domains, such as
Basics of cryptography,
personal privacy, government surveillance, and
cyberwarfare.

5
UNIT II -KEY MANAGEMENT AND AUTHENTICATION

Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles: Remote User-Authentication Using Symmetric Encryption, Kerberos Systems,
Remote User Authentication Using Asymmetric Encryption. 157

PART - A

Q.NO Questions BT Mark


Topic
Level
1. What is Symmetric Key Distribution in Key Management? Symmetric Key BTL1 2
Distribution,
2. Define X.509 Certificates. BTL1 2
X.509Certificates
3. Explain the purpose of a Public-Key Infrastructure (PKI). BTL2 2
Public-Key Infrastructure.
4. What is Remote User-Authentication? User Authentication: BTL1 2
Remote User-
Authentication
5. How does Kerberos System facilitate user authentication? . User Authentication: BTL3 2
Remote User-
Authentication
6. Differentiate between Symmetric and Asymmetric Symmetric Key BTL1 2
Encryption in Remote User-Authentication. Distribution,
7. Discuss the role of X.509 Certificates in Public-Key BTL3 2
X.509Certificates
Distribution.
8. What is the significance of User Authentication in secure BTL2 2
User Authentication
communication?
9. Examine the principles of Remote User-Authentication BTL4 2
User Authentication
Using Symmetric Encryption.
10. How does Public-Key Distribution work in a networked BTL1 2
Public-Key Infrastructure.
environment?
11. What is the main challenge in secure distribution of Symmetric Key BTL3 2
symmetric keys in large networks? Distribution,
12. What is the primary benefit of using Diffie-Hellman key BTL1 2
Public-Key Infrastructure.
exchange for public key cryptography?
Briefly explain the purpose and structure of an X.509 2
13. X.509Certificates BTL2
certificate.
What role does a Certificate Authority (CA) play in Public 2
Public-Key Infrastructure.
14. Key Infrastructure (PKI)? BTL2
15. Identify two vulnerabilities of relying solely on password- BTL4 2
User Authentication
based authentication.
16. What security principle does Kerberos implement by BTL6 2
Kerberos Systems,
using tickets instead of static passwords?
17. Differentiate between Kerberos and single-factor BTL5 2
Kerberos Systems,
authentication in terms of security strength.

6
How does Kerberos address the risk of replay attacks 2
18. during user authentication? Kerberos Systems, BTL5
Briefly explain the concept of "man-in-the-middle attack" Symmetric Key
19. in the context of public key exchange. Distribution, Distribution BTL6 2
of Public Keys,

20. What is a potential drawback of relying solely on BTL4 2


User Authentication
asymmetric encryption for user authentication?
21. Distinguish between authentication and authorization in a User Authentication BTL4 2
security system.
22. What are the three basic factors considered in multi- BTL6 2
User Authentication
factor authentication?
23. Identify two advantages of Kerberos over BTL5 2
Kerberos Systems,
username/password authentication.
24. What is the role of timestamps in Kerberos tickets and 2
Kerberos Systems, BTL5
how do they enhance security?
25. Differentiate between challenge-response authentication Kerberos Systems, User 2
and Kerberos authentication. Authentication BTL6
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Discuss the challenges and solutions in Symmetric Key Symmetric Key 13
Distribution in large-scale networks. Distribution, Distribution BTL1
of Public Keys,
2. Examine the components and processes involved in 13
Public-Key Infrastructure.
establishing a secure Public-Key Infrastructure (PKI). BTL1
3. Explore the principles and operation of Kerberos Systems 13
in user authentication. Kerberos Systems, BTL1

4. Analyze the security considerations in Remote User- Remote User- 13


Authentication Using Asymmetric Encryption. Authentication BTL1
Discuss the role of Certificate Authorities (CAs) in 13
X.509Certificates
5. managing and verifying X.509 Certificates. BTL2
Examine the security vulnerabilities associated with Symmetric Key 13
6. improper key management in cryptographic systems. Distribution, Distribution BTL2
of Public Keys,
7. Discuss the advantages and disadvantages of using X.509 BTL2 13
X.509Certificates
Certificates for public-key distribution.
Explore the mechanisms employed for Remote User- 13
Basics of cryptography,
8. Authentication in Virtual Private Networks (VPNs). BTL3
Analyze the impact of network latency on Remote User- Remote User- 13
9. Authentication using various cryptographic techniques. Authentication BTL3
Discuss the integration of biometric authentication with 13
10 User-Authentication BTL4
traditional methods in user authentication systems.

7
PART - C
Q.NO Questions BT Mark
Topic
Level
Evaluate the role of Token-based Authentication in Remote User- BTL5 15
1.
enhancing security in Remote User-Authentication. Authentication
Discuss the importance of Revocation Lists in managing 15
the security of X.509 Certificates. X.509Certificates BTL6
2.
Analyze the security implications of using Public-Key 15
Public-Key Infrastructure.
3. Cryptography for large-scale user authentication. BTL5
Examine the role of Cross-Certification in establishing BTL6 15
Public-Key Infrastructure.
4. trust between different Public-Key Infrastructures.
5. Discuss the emerging trends and challenges in Key Symmetric Key BTL3 15
Management and Distribution in the era of cloud Distribution, Distribution
computing. of Public Keys,

8
UNIT III - ACCESS CONTROL AND SECURITY

Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE
802.1X Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE).
Transport-Level Security: Web Security Considerations, Secure Sockets Layer, Transport Layer
Security, HTTPS standard, Secure Shell (SSH) application.

PART - A

Q.NO Questions BT Mark


Topic
Level
1. Define Network Access Control (NAC). BTL1 2
Network Access Control
2. Explain the purpose of Extensible Authentication Protocol Extensible Authentication BTL1 2
(EAP). Protocol
3. What is IEEE 802.1X Port-Based Network Access Control? IEEE 802.1X Port-Based BTL2 2
Network Access Control
4. Describe the role of IP Security (IPSec) in network IP Security - Internet Key BTL1 2
security. Exchange (IKE)
5. Differentiate between Transport Layer Security (TLS) and BTL3 2
Transport-Level Security
Secure Sockets Layer (SSL).
6. Examine the significance of HTTPS in web security. Web Security BTL1 2
Considerations, HTTPS
standard,
7. What is Internet Key Exchange (IKE)? IP Security - Internet Key BTL3 2
Exchange (IKE)
8. Discuss the goals of Network Access Control in modern BTL2 2
Network Access Control
cybersecurity.
9. Explain the concept of Transport-Level Security in BTL4 2
Transport-Level Security
network communication.
10. How does Secure Shell (SSH) enhance secure BTL1 2
Transport-Level Security
communication in network applications?
11. What is the primary purpose of Network Access Control BTL3 2
Network Access Control
(NAC)?
12. How does the Extensible Authentication Protocol (EAP) Extensible Authentication BTL1 2
facilitate secure network access? Protocol
Briefly explain the role of IEEE 802.1X in port-based IEEE 802.1X Port-Based 2
13. BTL2
network access control. Network Access Control
14. What security benefits does IPsec offer compared to BTL2 2
Network Access Control
unencrypted network communication?
15. How does Internet Key Exchange (IKE) establish secure IP Security - Internet Key BTL4 2
communication channels in IPsec? Exchange (IKE)
16. Differentiate between Network-Level and Host-Based BTL6 2
HTTPS standard,
intrusion detection/prevention systems.
17. What are the three main methods used for user BTL5 2
Network Access Control
authentication in NAC systems?
What are two potential challenges in managing and 2
18. distributing keys in NAC environments? Network Access Control BTL5

9
19. How can multi-factor authentication enhance the security Network Access Control BTL6 2
of network access control?
20. In what scenarios might MAC address filtering be a useful BTL4 2
Network Access Control
NAC control measure?
21. What are the key security concerns addressed by web Web Security BTL4 2
security protocols? Considerations

22. Identify the main differences between the SSL and TLS BTL6 2
Transport-Level Security
protocols.
23. What is the significance of digital certificates in HTTPS BTL5 2
HTTPS standard,
communication?
24. What type of encryption does SSH use, and what are its 2
Transport-Level Security BTL5
benefits?
25. Compare and contrast the security aspects of using SFTP BTL6 2
Transport-Level Security
and FTP for file transfer.
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Analyze the role of Extensible Authentication Protocol Extensible Authentication 13
BTL1
(EAP) in wireless network security. Protocol
2. Discuss the challenges and benefits of implementing IEEE 13
IEEE 802.1X Port-Based
802.1X Port-Based Network Access Control in enterprise BTL1
Network Access Control
networks.
3. Examine the architecture and mechanisms of Internet Key IP Security - Internet Key 13
BTL1
Exchange (IKE) in IPSec. Exchange (IKE)
4. Evaluate the evolution of Secure Sockets Layer (SSL) into 13
Transport Layer Security (TLS) and their impact on web Transport-Level Security BTL1
security.
Discuss the vulnerabilities and countermeasures 13
5. associated with Network Access Control (NAC) Network Access Control BTL2
implementations.
Analyze the security considerations and challenges in Web Security 13
6. deploying HTTPS across different web applications. Considerations, HTTPS BTL2
standard,
7. Explore the integration of IP Security (IPSec) with Virtual IP Security - Internet Key BTL2 13
Private Networks (VPNs) for secure communication. Exchange (IKE)
Discuss the role of Network Access Control in preventing 13
Network Access Control
8. and mitigating insider threats. BTL3
Examine the protocols and algorithms used in Transport- 13
9. Level Security for ensuring data integrity and Transport-Level Security BTL3
confidentiality.
Evaluate the security implications of Secure Shell (SSH) Secure Shell (SSH) 13
10 BTL4
key management in remote administration scenarios. application.

10
PART - C
Q.NO Questions BT Mark
Topic
Level
Discuss the impact of evolving technologies on the future BTL5 15
1. Network Access Control
of Network Access Control.
Analyze the potential threats and vulnerabilities 15
Extensible Authentication
associated with the Extensible Authentication Protocol BTL6
Protocol
2. (EAP) framework.
Examine the challenges and solutions in implementing 15
IEEE 802.1X Port-Based
3. IEEE 802.1X Port-Based Network Access Control in BTL5
Network Access Control
dynamic network environments.
Evaluate the role of Internet Key Exchange (IKE) in BTL6 15
IP Security - Internet Key
4. supporting secure communication in Internet of Things
Exchange (IKE)
(IoT) ecosystems.
5. Discuss the integration of Transport Layer Security (TLS) BTL3 15
Transport-Level Security
and HTTPS in securing modern web applications and
HTTPS standard,
services.

11
UNIT IV -APPLICATION LAYER SECURITY

Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless
Network Security: Mobile Device Security
PART - A

Q.NO Questions BT Mark


Topic
Level
1. Explain the concept of Pretty Good Privacy (PGP) in Electronic Mail Security: BTL1 2
electronic mail security. Pretty Good Privacy
2. Define S/MIME and its role in securing email BTL1 2
S/MIME
communication.
3. Discuss the purpose of DomainKeys Identified Mail DomainKeys Identified BTL2 2
(DKIM) in email security. Mail
4. How does Pretty Good Privacy (PGP) enhance the BTL1 2
Pretty Good Privacy
confidentiality of email messages?
5. Outline the key features of S/MIME that contribute to BTL3 2
S/MIME
secure email exchange.
6. Examine the challenges associated with implementing BTL1 2
DomainKeys Identified
DomainKeys Identified Mail (DKIM) in large-scale email
Mail
systems.
7. Compare and contrast Pretty Good Privacy (PGP) and BTL3 2
S/MIME in terms of cryptographic mechanisms and key Pretty Good Privacy
management.
8. Discuss the role of DomainKeys Identified Mail (DKIM) in DomainKeys Identified BTL2 2
preventing email spoofing and phishing attacks. Mail
9. Explain how email security technologies like PGP and BTL4 2
S/MIME
S/MIME contribute to regulatory compliance.
10. Analyze the impact of mobile device usage on the BTL1 2
Electronic Mail Security
effectiveness of email security measures.
11. What are the main security concerns addressed by email BTL3 2
Electronic Mail Security
encryption?
12. explain how Pretty Good Privacy (PGP) uses public-key BTL1 2
Pretty Good Privacy
cryptography for email security.
What is the role of a "keychain" in PGP and how does it 2
13. Pretty Good Privacy BTL2
ensure privacy
14. Differentiate between S/MIME and PGP in terms of their Pretty Good Privacy, 2
key management approaches. S/MIME BTL2
15. How does DomainKeys Identified Mail (DKIM) help DomainKeys Identified BTL4 2
prevent email spoofing and phishing? Mail
16. What are the limitations of DKIM when used alone for DomainKeys Identified BTL6 2
email security? Mail
17. What measures can be taken to improve the effectiveness DomainKeys Identified BTL5 2
of DMARC, SPF, and DKIM combination in email security? Mail
Why is user education crucial in combating phishing 2
18. attacks targeting email communication? Electronic Mail Security BTL5

12
19. Describe two best practices for creating strong passwords Electronic Mail Security
for email accounts. BTL6 2
20. What security risks are associated with using public Wi-Fi Wireless BTL4 2
for accessing email services? Network Security
21. How can two-factor authentication enhance email Mobile Device Security BTL4 2
security compared to password-only logins?
22. What considerations should be taken when using cloud- BTL6 2
Electronic Mail Security
based email services regarding security and privacy?
23. What ethical considerations should be addressed when DomainKeys Identified BTL5 2
sending and receiving sensitive information via email? Mail
24. Briefly explain the concept of end-to-end encryption and 2
Electronic Mail Security BTL5
its potential benefits in email security.
25. What challenges and limitations are associated with
DomainKeys Identified
implementing end-to-end encryption for email on a large BTL6 2
Mail
scale?
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Evaluate the strengths and weaknesses of Pretty Good
Privacy (PGP) in the context of contemporary email Pretty Good Privacy BTL1 13
security requirements.
2. Discuss the evolution of S/MIME and its adaptation to
S/MIME
address emerging threats in email communication. BTL1 13
3. Analyze the key components and protocols involved in
DomainKeys Identified
the implementation of DomainKeys Identified Mail BTL1 13
Mail
(DKIM) for email authentication
4. Explore the integration of Pretty Good Privacy (PGP) and
Pretty Good Privacy,
S/MIME in securing email communication within BTL1 13
S/MIME
corporate environments.
Examine the role of DomainKeys Identified Mail (DKIM) in
DomainKeys Identified
5. enhancing the deliverability and trustworthiness of email BTL2 13
Mail
messages.
Evaluate the impact of PGP and S/MIME on the usability Pretty Good Privacy,
6. BTL2
and user experience of encrypted email communication. S/MIME 13
7. Discuss the challenges and opportunities in implementing
DomainKeys Identified
DomainKeys Identified Mail (DKIM) for email security in BTL2 13
Mail
large-scale email service providers.
Examine the role of email security technologies in
8. mitigating the risks associated with business email Electronic Mail Security BTL3 13
compromise (BEC) attacks.
Analyze the trade-offs between cryptographic security
9. and usability in the design and implementation of Pretty Pretty Good Privacy BTL3 13
Good Privacy (PGP).
Discuss the implications of S/MIME for secure
10 communication in a multi-platform and multi-device S/MIME BTL4 13
email environment.

13
PART - C
Q.NO Questions BT Mark
Topic
Level
Explore the future trends and advancements in electronic
Pretty Good Privacy,
1. mail security beyond current technologies like PGP, BTL5 15
S/MIME
S/MIME, and DKIM.
Evaluate the impact of regulatory frameworks such as
GDPR on the adoption and implementation of email Electronic Mail Security BTL6 15
2. security technologies.
Analyze the role of DomainKeys Identified Mail (DKIM) in
3. addressing emerging challenges related to email Electronic Mail Security BTL5 15
deliverability and trust in the digital era.
Discuss the ethical considerations and potential societal
Pretty Good Privacy,
4. impacts of widespread adoption of encrypted email BTL6 15
S/MIME
technologies like PGP and S/MIME.
5. Examine the challenges and opportunities in securing BTL3
email communication in the era of increased mobile Mobile Device Security 15
device usage and remote work.

14
UNIT V -SECURITY PRACTICES

Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security.
PART - A

Q.NO Questions BT Mark


Topic
Level
1. Define Intrusion Detection Systems (IDS). Intrusion Detection BTL1 2
Systems (IDS)
2. Differentiate between Host-based and Network-based Intrusion Detection BTL1 2
IDS. Systems (IDS)
3. Explain the role of IDS in detecting cybersecurity threats. Intrusion Detection BTL1 2
Systems (IDS)
4. Define Password Management in the context of BTL1 2
Password Management
cybersecurity.
5. Discuss the importance of strong and unique passwords. BTL1 2
Password Management
6. Explain the risks associated with poor password BTL1 2
Password Management
management practices.
7. List and explain the characteristics of an effective firewall. BTL2 2
Firewall Characteristics
8. Differentiate between Stateful Inspection and Packet BTL2 2
Firewall Characteristics
Filtering firewalls.
9. Discuss the role of proxy services in firewall operations. BTL5 2
Firewall Characteristics
10. Compare and contrast Proxy Firewalls and Application BTL2 2
types of Firewalls
Layer Firewalls.
11. What is a virus in a computer? Classify the types of BTL3 2
types of Firewalls
viruses.
12. Explain how Stateful Inspection Firewalls enhance BTL3 2
types of Firewalls
security.
Explain the concept of Firewall Basing and its importance Firewall Basing and BTL3 2
13.
Configurations
14. Discuss the criteria used for setting up firewalls based on Firewall Basing and BTL4 2
security zones. Configurations
15. Highlight the challenges associated with firewall Firewall Basing and BTL4 2
configurations Configurations
16. What is the primary function of a firewall in network Firewalls and Intrusion BTL4 2
security? Detection
17. explain the difference between stateful and stateless Firewalls and Intrusion BTL2 2
firewalls. Detection
Show the design goals of firewalls. Firewalls and Intrusion BTL6 2
18.
Detection
19. Discriminate statistical anomaly detection and rule-based Intrusion Detection BTL5
detection 2

15
20. Does the firewall ensure 100% security to the system? Firewalls and Intrusion BTL6 2
Comment. Detection
21. Explain the role of Intrusion Detection Systems (IDS) in Intrusion Detection BTL4 2
cybersecurity.
22. What is the role of firewall policies in defining allowed BTL4 2
Firewall Characteristics
and denied traffic
23. List and briefly describe the characteristics of an effective BTL2 2
Firewall Characteristics
firewall.
24. Differentiate between Host-based and Network-based BTL6 2
Intrusion Detection
Intrusion Detection Systems.
25. Explain the types of firewalls commonly used in network Firewalls and Intrusion BTL5 2
security. Detection
PART - B

Q.NO Questions BT Mark


Topic
Level
1. Define Blockchain and its fundamental principles. BTL1
Blockchain Technology
13
2. Explain how blockchain ensures data integrity and BTL1
Blockchain Technology
security. 13
3. Discuss the potential applications of blockchain beyond
Blockchain Technology BTL2
cryptocurrency. 13
4. Define Cloud Security and its significance in the digital BTL1
Cloud Security
era. 13
Discuss key considerations in securing data and
Cloud Security
5. applications in the cloud. BTL2 13
Explain the shared responsibility model in cloud security.
6. Cloud Security BTL1
13
7. Discuss the security challenges associated with the Internet of Things (IoT)
Internet of Things (IoT). Security BTL2 13
Explain how IoT devices can be vulnerable to cyber Internet of Things (IoT)
8. threats. Security BTL4 13
Propose security measures to mitigate risks in IoT Internet of Things (IoT)
BTL3
9. ecosystems. Security 13
What are the core principles and functionalities of Emerging Technologies
10 BTL4
blockchain technology? and Security 13

16
PART - C
Q.NO Questions BT Mark
Topic
Level
How does blockchain contribute to enhanced security
1. Blockchain Technology
and trust in various applications? BTL5 15
What are the key security considerations for cloud
Cloud Security
2. computing environments? BTL6 15
What are the main security concerns associated with Internet of Things (IoT)
3. Internet of Things (IoT) devices? Security BTL5 15
How can ethical considerations be addressed when Blockchain Technology,
4. implementing security measures in emerging Internet of Things (IoT) BTL6 15
technologies like blockchain, cloud, and IoT? Security
5. What are the responsibilities of individuals and BTL3
organizations in staying informed about evolving security Emerging Technologies 15
threats and vulnerabilities in these emerging and Security
technologies?

17

You might also like