Ccs354 Network Security QB 2024-2025
Ccs354 Network Security QB 2024-2025
QUESTION BANK
SUBJECT CODE: CCS354 YEAR /SEM: III/VI
Course Outcomes
After successful Completion of the Course, the Students should be able to
Course
Outcome No Course Outcomes
CO314.3 Evaluate the security techniques applied to network and transport layer
1
UNIT I
INTRODUCTION
UNIT II
Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User
Authentication Using Asymmetric Encryption. 157
UNIT III
Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE
802.1X
Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-
Level
Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security,
HTTPS
standard, Secure Shell (SSH) application.
UNIT IV
Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail.
Wireless
Network Security: Mobile Device Security
UNIT V
SECURITY PRACTICES
2
UNIT I -INTRODUCTION
PART - A
Q.NO Questions BT Mark
Topic
Level
1. Define Cryptography. BTL1 2
Basics of cryptography,
2. Differentiate between Encryption and Decryption. BTL1 2
Basics of cryptography,
3. Explain the concept of a Symmetric Key Algorithm. BTL2 2
public-key cryptography,
4. Define a Digital Signature. BTL1 2
digital signatures.
5. What is a Hash Function? BTL3 2
hash functions
6. Discuss the purpose of a Public Key in public-key BTL1 2
public-key cryptography,
cryptography.
7. What is Two-Factor Authentication? BTL3 2
authentication,
8. Explain the importance of Randomness in cryptographic BTL2 2
Basics of cryptography,
algorithms.
9. Describe the role of a Certificate Authority (CA) in digital authentication, BTL4 2
certificates. and digital signatures.
3
19. Provide three common authentication mechanisms. authentication, BTL6 2
20. What is a digital signature, and how does it ensure non- digital signatures. BTL4 2
repudiation?
21. Explain the concept of digital certificates digital signatures. BTL4 2
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Compare and contrast Symmetric Key Cryptography and 13
Basics of cryptography, BTL1
Asymmetric Key Cryptography
2. Examine the steps involved in the creation and authentication, 13
verification of a Digital Signature. and digital signatures. BTL1
3. Discuss the challenges and advantages of implementing 13
public-key cryptography, BTL1
Public Key Infrastructure (PKI).
4. Explore the role of Hash Functions in ensuring data 13
hash functions
integrity in blockchain technology. BTL1
Explain the concept of a Collision in Hash Functions and 13
hash functions
5. its implications. BTL2
Discuss the limitations and potential vulnerabilities of 13
6. public-key cryptography, BTL2
conventional (single-key) encryption.
7. Describe the principles of Kerberos authentication BTL2 13
authentication,
protocol
Examine the importance of Key Management in 13
Basics of cryptography,
8. cryptographic systems. BTL3
Discuss the characteristics of a secure Random Number authentication, 13
9. Generator (RNG). and digital signatures. BTL3
4
PART - C
Q.NO Questions BT Mark
Topic
Level
Discuss the design principles of a secure hash function, BTL5 15
1. hash functions
highlighting collision resistance and avalanche effect.
Design a secure communication protocol that 15
incorporates encryption, authentication, and integrity BTL6
authentication,
2. verification. Specify the algorithms or techniques you
would use, explaining their rationale.
Explore the relationship between Cryptography and 15
public-key cryptography,
3. Network Security. BTL5
Discuss the applications and challenges of cryptographic BTL6 15
public-key cryptography,
4. techniques in the Internet of Things (IoT).
5. Critically evaluate the ethical considerations surrounding BTL3 15
the use of cryptography in various domains, such as
Basics of cryptography,
personal privacy, government surveillance, and
cyberwarfare.
5
UNIT II -KEY MANAGEMENT AND AUTHENTICATION
Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys,
X.509Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication
Principles: Remote User-Authentication Using Symmetric Encryption, Kerberos Systems,
Remote User Authentication Using Asymmetric Encryption. 157
PART - A
6
How does Kerberos address the risk of replay attacks 2
18. during user authentication? Kerberos Systems, BTL5
Briefly explain the concept of "man-in-the-middle attack" Symmetric Key
19. in the context of public key exchange. Distribution, Distribution BTL6 2
of Public Keys,
7
PART - C
Q.NO Questions BT Mark
Topic
Level
Evaluate the role of Token-based Authentication in Remote User- BTL5 15
1.
enhancing security in Remote User-Authentication. Authentication
Discuss the importance of Revocation Lists in managing 15
the security of X.509 Certificates. X.509Certificates BTL6
2.
Analyze the security implications of using Public-Key 15
Public-Key Infrastructure.
3. Cryptography for large-scale user authentication. BTL5
Examine the role of Cross-Certification in establishing BTL6 15
Public-Key Infrastructure.
4. trust between different Public-Key Infrastructures.
5. Discuss the emerging trends and challenges in Key Symmetric Key BTL3 15
Management and Distribution in the era of cloud Distribution, Distribution
computing. of Public Keys,
8
UNIT III - ACCESS CONTROL AND SECURITY
Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE
802.1X Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE).
Transport-Level Security: Web Security Considerations, Secure Sockets Layer, Transport Layer
Security, HTTPS standard, Secure Shell (SSH) application.
PART - A
9
19. How can multi-factor authentication enhance the security Network Access Control BTL6 2
of network access control?
20. In what scenarios might MAC address filtering be a useful BTL4 2
Network Access Control
NAC control measure?
21. What are the key security concerns addressed by web Web Security BTL4 2
security protocols? Considerations
22. Identify the main differences between the SSL and TLS BTL6 2
Transport-Level Security
protocols.
23. What is the significance of digital certificates in HTTPS BTL5 2
HTTPS standard,
communication?
24. What type of encryption does SSH use, and what are its 2
Transport-Level Security BTL5
benefits?
25. Compare and contrast the security aspects of using SFTP BTL6 2
Transport-Level Security
and FTP for file transfer.
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Analyze the role of Extensible Authentication Protocol Extensible Authentication 13
BTL1
(EAP) in wireless network security. Protocol
2. Discuss the challenges and benefits of implementing IEEE 13
IEEE 802.1X Port-Based
802.1X Port-Based Network Access Control in enterprise BTL1
Network Access Control
networks.
3. Examine the architecture and mechanisms of Internet Key IP Security - Internet Key 13
BTL1
Exchange (IKE) in IPSec. Exchange (IKE)
4. Evaluate the evolution of Secure Sockets Layer (SSL) into 13
Transport Layer Security (TLS) and their impact on web Transport-Level Security BTL1
security.
Discuss the vulnerabilities and countermeasures 13
5. associated with Network Access Control (NAC) Network Access Control BTL2
implementations.
Analyze the security considerations and challenges in Web Security 13
6. deploying HTTPS across different web applications. Considerations, HTTPS BTL2
standard,
7. Explore the integration of IP Security (IPSec) with Virtual IP Security - Internet Key BTL2 13
Private Networks (VPNs) for secure communication. Exchange (IKE)
Discuss the role of Network Access Control in preventing 13
Network Access Control
8. and mitigating insider threats. BTL3
Examine the protocols and algorithms used in Transport- 13
9. Level Security for ensuring data integrity and Transport-Level Security BTL3
confidentiality.
Evaluate the security implications of Secure Shell (SSH) Secure Shell (SSH) 13
10 BTL4
key management in remote administration scenarios. application.
10
PART - C
Q.NO Questions BT Mark
Topic
Level
Discuss the impact of evolving technologies on the future BTL5 15
1. Network Access Control
of Network Access Control.
Analyze the potential threats and vulnerabilities 15
Extensible Authentication
associated with the Extensible Authentication Protocol BTL6
Protocol
2. (EAP) framework.
Examine the challenges and solutions in implementing 15
IEEE 802.1X Port-Based
3. IEEE 802.1X Port-Based Network Access Control in BTL5
Network Access Control
dynamic network environments.
Evaluate the role of Internet Key Exchange (IKE) in BTL6 15
IP Security - Internet Key
4. supporting secure communication in Internet of Things
Exchange (IKE)
(IoT) ecosystems.
5. Discuss the integration of Transport Layer Security (TLS) BTL3 15
Transport-Level Security
and HTTPS in securing modern web applications and
HTTPS standard,
services.
11
UNIT IV -APPLICATION LAYER SECURITY
Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless
Network Security: Mobile Device Security
PART - A
12
19. Describe two best practices for creating strong passwords Electronic Mail Security
for email accounts. BTL6 2
20. What security risks are associated with using public Wi-Fi Wireless BTL4 2
for accessing email services? Network Security
21. How can two-factor authentication enhance email Mobile Device Security BTL4 2
security compared to password-only logins?
22. What considerations should be taken when using cloud- BTL6 2
Electronic Mail Security
based email services regarding security and privacy?
23. What ethical considerations should be addressed when DomainKeys Identified BTL5 2
sending and receiving sensitive information via email? Mail
24. Briefly explain the concept of end-to-end encryption and 2
Electronic Mail Security BTL5
its potential benefits in email security.
25. What challenges and limitations are associated with
DomainKeys Identified
implementing end-to-end encryption for email on a large BTL6 2
Mail
scale?
PART - B
Q.NO Questions BT Mark
Topic
Level
1. Evaluate the strengths and weaknesses of Pretty Good
Privacy (PGP) in the context of contemporary email Pretty Good Privacy BTL1 13
security requirements.
2. Discuss the evolution of S/MIME and its adaptation to
S/MIME
address emerging threats in email communication. BTL1 13
3. Analyze the key components and protocols involved in
DomainKeys Identified
the implementation of DomainKeys Identified Mail BTL1 13
Mail
(DKIM) for email authentication
4. Explore the integration of Pretty Good Privacy (PGP) and
Pretty Good Privacy,
S/MIME in securing email communication within BTL1 13
S/MIME
corporate environments.
Examine the role of DomainKeys Identified Mail (DKIM) in
DomainKeys Identified
5. enhancing the deliverability and trustworthiness of email BTL2 13
Mail
messages.
Evaluate the impact of PGP and S/MIME on the usability Pretty Good Privacy,
6. BTL2
and user experience of encrypted email communication. S/MIME 13
7. Discuss the challenges and opportunities in implementing
DomainKeys Identified
DomainKeys Identified Mail (DKIM) for email security in BTL2 13
Mail
large-scale email service providers.
Examine the role of email security technologies in
8. mitigating the risks associated with business email Electronic Mail Security BTL3 13
compromise (BEC) attacks.
Analyze the trade-offs between cryptographic security
9. and usability in the design and implementation of Pretty Pretty Good Privacy BTL3 13
Good Privacy (PGP).
Discuss the implications of S/MIME for secure
10 communication in a multi-platform and multi-device S/MIME BTL4 13
email environment.
13
PART - C
Q.NO Questions BT Mark
Topic
Level
Explore the future trends and advancements in electronic
Pretty Good Privacy,
1. mail security beyond current technologies like PGP, BTL5 15
S/MIME
S/MIME, and DKIM.
Evaluate the impact of regulatory frameworks such as
GDPR on the adoption and implementation of email Electronic Mail Security BTL6 15
2. security technologies.
Analyze the role of DomainKeys Identified Mail (DKIM) in
3. addressing emerging challenges related to email Electronic Mail Security BTL5 15
deliverability and trust in the digital era.
Discuss the ethical considerations and potential societal
Pretty Good Privacy,
4. impacts of widespread adoption of encrypted email BTL6 15
S/MIME
technologies like PGP and S/MIME.
5. Examine the challenges and opportunities in securing BTL3
email communication in the era of increased mobile Mobile Device Security 15
device usage and remote work.
14
UNIT V -SECURITY PRACTICES
Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security.
PART - A
15
20. Does the firewall ensure 100% security to the system? Firewalls and Intrusion BTL6 2
Comment. Detection
21. Explain the role of Intrusion Detection Systems (IDS) in Intrusion Detection BTL4 2
cybersecurity.
22. What is the role of firewall policies in defining allowed BTL4 2
Firewall Characteristics
and denied traffic
23. List and briefly describe the characteristics of an effective BTL2 2
Firewall Characteristics
firewall.
24. Differentiate between Host-based and Network-based BTL6 2
Intrusion Detection
Intrusion Detection Systems.
25. Explain the types of firewalls commonly used in network Firewalls and Intrusion BTL5 2
security. Detection
PART - B
16
PART - C
Q.NO Questions BT Mark
Topic
Level
How does blockchain contribute to enhanced security
1. Blockchain Technology
and trust in various applications? BTL5 15
What are the key security considerations for cloud
Cloud Security
2. computing environments? BTL6 15
What are the main security concerns associated with Internet of Things (IoT)
3. Internet of Things (IoT) devices? Security BTL5 15
How can ethical considerations be addressed when Blockchain Technology,
4. implementing security measures in emerging Internet of Things (IoT) BTL6 15
technologies like blockchain, cloud, and IoT? Security
5. What are the responsibilities of individuals and BTL3
organizations in staying informed about evolving security Emerging Technologies 15
threats and vulnerabilities in these emerging and Security
technologies?
17