0% found this document useful (0 votes)
14 views

CCS354- Network Security Question Bank COE

The document outlines the syllabus and exam questions for a course on Network Security, covering topics such as cryptography, key management, access control, application layer security, and security practices. It includes various question formats categorized into parts A, B, and C, focusing on theoretical concepts, practical applications, and algorithm explanations. The document serves as a comprehensive guide for students in the Information Technology department to prepare for their assessments.

Uploaded by

lakshithask.2212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

CCS354- Network Security Question Bank COE

The document outlines the syllabus and exam questions for a course on Network Security, covering topics such as cryptography, key management, access control, application layer security, and security practices. It includes various question formats categorized into parts A, B, and C, focusing on theoretical concepts, practical applications, and algorithm explanations. The document serves as a comprehensive guide for students in the Information Technology department to prepare for their assessments.

Uploaded by

lakshithask.2212
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

DEPARTMENT : Information Technology

SUBJECT CODE : CCS354

SUBJECT NAME :Network security

FACULTY NAME : Ms. Venkadeshwari M

YEAR & SEMESTER : III & O6


UNIT 1- INTRODUCTION

SYLLABUS

Basics of cryptography, conventional and public-key cryptography, hash functions, authentication, and digital
signatures.

PART -A

K
Q.NO QUESTIONS CO’s
LEVEL
1. What are the types of security attacks? K1 CO1
2. Compare substitution ciphers with transposition ciphers. K2 CO1
3. Compare block ciphers with stream ciphers. K2 CO1
4. Write about strength of DES algorithm. K2 CO1
5. What is a digital signature? K1 CO1

6. List three approaches to Message Authentication. K1 CO1


7. What properties must a hash function have to be useful for K1 CO1
message authentication?
8. What are different approaches to Public-key Management? K1 CO1

9. What you meant by hash function? K1 CO1

10. Distinguish between direct and arbitrated digital signature? K2 CO1

11. What are the properties a digital signature should have? K1 CO1

12. Compare MD5, SHA1 and RIPEMD-160 algorithm K2 CO1

PART B
1. Consider the following: Plaintext: “PROTOCOL” Secret key: K4 CO2
“NETWORK”
What is the corresponding cipher text using play fair cipher
method?
2. Explain the AES algorithm. K3 CO2

3. Explain the DSA Algorithm K3 CO2

4. What is biometric authentication K1 CO2

5. Compare symmetric and asymmetric key cryptography K2 CO2

6. What are the requirements of Authentication? K1 CO2

7. Discuss about Secure Hash algorithm K2 CO2

8. Give various security services. K2 CO2


9. Discuss in detail about various types of Security attacks with K3 CO2
neat diagrams.
10. Give a model for Network Security with neat K3 CO2
diagram.
11. What is symmetric key cryptography? Discuss its advantages K1 CO2
and limitations.
12. Explain various substitution techniques with suitable K2 CO2
examples.
13. What is Elliptic Curve Cryptography (ECC)? Discuss K1 CO2
ECC algorithm with neat diagram.

PART-C

1. Discuss clearly Secure Hash Algorithm(SHA) K2 CO2

2. Describe the MD5 message digest algorithm with K2 CO2


necessary block diagrams
3. Briefly explain Deffie Hellman key exchange with an K1 CO2
example
4. Perform Encryption and decryption algorithm using K2 CO2
RSA Algorithm Where p=3,q=11,e=7,M=5
Consider the public key system using RSA ,let the K4 CO2
5. cipher text C-10, be sent to a user whose public key
is e=5,n=35.What is the Plain text M?
UNIT 2- KEY MANAGEMENT AND AUTHENTICATION

SYLLABUS

Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509 Certificates,
Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles, Remote User-
Authentication Using Symmetric Encryption, Kerberos Systems, Remote User Authentication Using Asymmetric
Encryption.

PART -A

K
Q.NO QUESTIONS CO’s
LEVEL
1. Give features of Authentication Header. CO2
K2
2. What is message authentication? K1 CO2

3. Define the classes of message authentication function. K1 CO2

4. What are the requirements for message authentication? K1 CO2

5. Define Kerberos K1 CO2

6. What is Kerberos? What are the uses? K2 CO2

7. What 4 requirements were defined by Kerberos? K2 CO2

8. In the content of Kerberos, what is realm? K2 CO2

9. What is the purpose of X.509 standard? K1 CO2

10. List the 3 classes of intruder? K2 CO2

11. Define virus. Specify the types of viruses? K1 CO2

12. List out the four phases of virus. K2 CO2

PART B

Describe the schemes that are widely used for the K2 CO2
distribution of public keys with examples
1.
K2 CO2
Elaborate the key elements of PKIX architectural model
2.
with a neat diagram
3. Explain the steps involved in Kerberos protocol for K2 CO2
providing authentication service
4. Identify the protocol used for the following one way K3 CO2
authentication techniques based on asymmetric encryption
and explain the protocol
A→B : IDA
B→A:R1
A→B:E(PRu,R1)
UNIT 3- ACCESS CONTROL AND SECURITY

SYLLABUS
Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X Port-Based
Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level Security: Web Security
Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS standard, Secure Shell (SSH) application.

PART -A

K
Q.NO QUESTIONS CO’s
LEVEL
1. What is Secure Socket Layer? K1 CO3

2. What are different alert codes of TLS protocol? K1 CO3

3. Define IP Security. K2 CO3

4. List out the IKE hybrid protocol dependence. K2 CO3

5. What does IKE hybrid protocol mean? K1 CO3

6. Give SSL record format? K2 CO3

7. What are the steps involved in SET Transaction? K1 CO3

8. What is the role of Internet Key Exchange (IKE) in IPsec? K1 CO3

9. Define Extensible Authentication Protocol (EAP). K2 CO3

10. Define HTTPS and its significance in web security. K2 CO3

11. Mention two key features of Secure Shell (SSH). K2 CO3

12. What is mutual authentication in TLS? K1 CO3

13. How does NAC enhance network security? K3 CO3

14. What is mutual authentication in TLS? K1 CO3

PART B

K
Q.NO QUESTIONS CO’s
LEVEL
1. List and briefly define the parameters that define an SSL K2 CO3
session state.

2. What are different services provided by the SSL Record K1 CO3


Protocol?
3. Write a short note on Pretty Good Privacy. K2 CO3

4. Give IP Security architecture with neat diagram. K3 CO3


5. Compare the security features of IPsec and TLS/SSL in K3 CO3
protecting network data transmission.
6. Create a detailed plan to secure web applications using HTTPS, K6 CO3
TLS, and IPsec, focusing on encryption, authentication, and data
protection.

PART-C

K
Q.NO QUESTIONS CO’s
LEVEL
1. Briefly describe various network access K2 Co3
enforcement methods in detail
2. Describe the protocol layer that form the context of K2 Co3
extensible authentication protocol EAP with a neat
diagram explain the authentication methods
supported by EAP
3. Explain the SSH protocol stack in detail with a neat K3 Co3
diagram, Explain the SSH user authentication
protocol and connection protocol with the steps
involved in message exchanges.
4. Explain the IEEE 802.1X Port-Based Network Access K2 Co3
Control mechanism and its significance in enterprise
networks.
5. Describe the Internet Key Exchange (IKE) protocol K2 Co3
and explain its importance in IPsec.

UNIT 4- APPLICATION LAYER SECURITY

SYLLABUS

Electronic Mail Security: Pretty Good Privacy, S/MIME, Domain Keys Identified Mail. Wireless Network Security:
Mobile Device Security
PART -A

K
Q.NO QUESTIONS CO’s
LEVEL
1. CO4
How does PGP provides public key management? K2

2. Define key Identifier? K2 CO4


3. List the limitations of SMTP/RFC 822? K2 CO4

4. Define S/MIME? K2 CO4

5. What are the different between SSL version 3 and TLS? K1 CO4

6. What are the services provided by PGP services K1 CO4

7. Why E-mail compatibility function in PGP needed? K2 CO4


8. Name any cryptographic keys used in PGP? K2 CO4

9. Define S/MIME. K2 CO4

10. What are the services provided by PGP services? K1 CO4

11. Name any cryptographic keys used in PGP? K2 CO4

12. What are the steps involved in SET transaction? K1 CO4

13. List out the features of SET. K2 CO4

14. What is security association? K1 CO4

What does Internet key management in IPSec? CO4


15. K1
16. What are the two security services provided by IPSec? K1 CO4

17. K1 CO4
What are the two security services provided by IPSec?

18. What are the fields available in AH header? K1 CO4


PART B

K
Q.NO QUESTIONS CO’s
LEVEL
Explain MIME context types. K3 CO4
2.
What are the five principal services provided by CO4
3. K1
PGP?
4. Briefly discuss about different services provided by K2 CO4
Pretty Good Privacy (PGP).
5. What are different cryptographic algorithms used in K1 CO4
S/MIME? Explain how S/MIME is better than MIME.
6. Write short notes on authentication header and ESP K4 CO4

Explain the operational description of PGP.


K3 CO4
7.
K3 CO4
8. Write Short notes on S/MIME.
K2 CO4
9. Explain the architecture of IP Security.
Write short notes on authentication header and ESP. CO4
10. K3
Explain Secure Electronic transaction with neat K3 CO4
11. diagram.
Write brief note on E-mail Security. K3 CO4
12.
Write brief note on IP Security. K3 CO4
13.
Write brief note on Web Security. K3 CO4
14.
Explain about PKI in detail K2 CO4
15.
Describe the five phases of operations of IEEE 802.11i K2 CO4
16. RSN in detail
PART-C

K
Q.NO QUESTIONS CO’s
LEVEL
1. Explain in detail the operation of Internet Key Exchange K2 CO4
with an example.
2. Describe about SSL/TLS Protocol. K3 CO4

3. Write short notes on authentication header and ESP. K2 CO4

4. a) describe the major security concerns related to K3 CO4


mobile device security(7)
b) describe the elements of mime specification in
detail(8)
UNIT 5- SECURITY PRACTICES

SYLLABUS
UNIT V
Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall Characteristics
Types of Firewalls, Firewall Basing, Firewall Location and Configurations. Blockchains, Cloud Security and IoT
security
PART -A

K
Q.NO QUESTIONS CO’s
LEVEL
1. What are the limitations of firewalls? K1 CO5

2. How to manage the password? K2 CO5

3. Discuss cross site scripting vulnerability. K1 CO5

4. List the design goals of firewalls? K2 CO5

5. What is the primary function of a firewall? K1 CO5

6. Define Intrusion Detection System (IDS). K2 CO5

7. What is packet filtering in a firewall? K1 CO5

8. Mention two types of firewalls. K2 CO5

9. What does firewall basing mean? K1 CO5

10. What is stateful inspection in a firewall? K1 CO5

11. How does an IDS differ from an IPS (Intrusion Prevention K2 CO5
System)?
12. What is the purpose of a DMZ in network security? K1 CO5

13. Mention two advantages of using a firewall. K2 CO5

What is deep packet inspection? CO5


14. K1
PART B
1. K1 CO5
What are the types of firewalls?

2. K2 CO5
Explain password management.

What is a Firewall? Explain its design principles and types CO5


3. K1
with example.
4. K2 CO5
Discuss about Password Management.

5. K3 CO5
Write a neat diagram explain the various components of
IoT framework.
6. K3 CO5
Discuss the various SecaaS Categories of service offered
by the service provider for cloud security with examples.
7. K2 CO5
Explain in detail the elements of typical block in blockchain.
(6)
8. K3 CO5
Describes the characteristics of pocket filtering firewall
along with its advantages and limitations.
9. Define and describe the purpose of firewalls, including K2 CO5
their characteristics and different types
10. Explain the differences between Intrusion Detection CO5
Systems (IDS) and Intrusion Prevention Systems (IPS) K2
with suitable examples.
11. List and describe common IoT security threats and their K2 CO5
impact on network security.
12. Explain the significance of network segmentation in IoT K3 CO5
security.
13. Explain the shared responsibility model in cloud K2 CO5
security for SaaS, PaaS, and IaaS services.
PART-C
1. Explain the firewall design principles. K2 CO5

2. What are the positive and negative effects of firewall? K1 CO5

3. Describe the familiar types of firewall configurations K1 CO5

4. Assess the effectiveness of password management K1 CO5


strategies in protecting organizational networks.
5. Compare packet filtering, stateful inspection, and deep K4 CO5
packet inspection in firewalls, highlighting their
advantages and disadvantages.

You might also like