CCS354- Network Security Question Bank COE
CCS354- Network Security Question Bank COE
SYLLABUS
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication, and digital
signatures.
PART -A
K
Q.NO QUESTIONS CO’s
LEVEL
1. What are the types of security attacks? K1 CO1
2. Compare substitution ciphers with transposition ciphers. K2 CO1
3. Compare block ciphers with stream ciphers. K2 CO1
4. Write about strength of DES algorithm. K2 CO1
5. What is a digital signature? K1 CO1
11. What are the properties a digital signature should have? K1 CO1
PART B
1. Consider the following: Plaintext: “PROTOCOL” Secret key: K4 CO2
“NETWORK”
What is the corresponding cipher text using play fair cipher
method?
2. Explain the AES algorithm. K3 CO2
PART-C
SYLLABUS
Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509 Certificates,
Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles, Remote User-
Authentication Using Symmetric Encryption, Kerberos Systems, Remote User Authentication Using Asymmetric
Encryption.
PART -A
K
Q.NO QUESTIONS CO’s
LEVEL
1. Give features of Authentication Header. CO2
K2
2. What is message authentication? K1 CO2
PART B
Describe the schemes that are widely used for the K2 CO2
distribution of public keys with examples
1.
K2 CO2
Elaborate the key elements of PKIX architectural model
2.
with a neat diagram
3. Explain the steps involved in Kerberos protocol for K2 CO2
providing authentication service
4. Identify the protocol used for the following one way K3 CO2
authentication techniques based on asymmetric encryption
and explain the protocol
A→B : IDA
B→A:R1
A→B:E(PRu,R1)
UNIT 3- ACCESS CONTROL AND SECURITY
SYLLABUS
Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X Port-Based
Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level Security: Web Security
Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS standard, Secure Shell (SSH) application.
PART -A
K
Q.NO QUESTIONS CO’s
LEVEL
1. What is Secure Socket Layer? K1 CO3
PART B
K
Q.NO QUESTIONS CO’s
LEVEL
1. List and briefly define the parameters that define an SSL K2 CO3
session state.
PART-C
K
Q.NO QUESTIONS CO’s
LEVEL
1. Briefly describe various network access K2 Co3
enforcement methods in detail
2. Describe the protocol layer that form the context of K2 Co3
extensible authentication protocol EAP with a neat
diagram explain the authentication methods
supported by EAP
3. Explain the SSH protocol stack in detail with a neat K3 Co3
diagram, Explain the SSH user authentication
protocol and connection protocol with the steps
involved in message exchanges.
4. Explain the IEEE 802.1X Port-Based Network Access K2 Co3
Control mechanism and its significance in enterprise
networks.
5. Describe the Internet Key Exchange (IKE) protocol K2 Co3
and explain its importance in IPsec.
SYLLABUS
Electronic Mail Security: Pretty Good Privacy, S/MIME, Domain Keys Identified Mail. Wireless Network Security:
Mobile Device Security
PART -A
K
Q.NO QUESTIONS CO’s
LEVEL
1. CO4
How does PGP provides public key management? K2
5. What are the different between SSL version 3 and TLS? K1 CO4
17. K1 CO4
What are the two security services provided by IPSec?
K
Q.NO QUESTIONS CO’s
LEVEL
Explain MIME context types. K3 CO4
2.
What are the five principal services provided by CO4
3. K1
PGP?
4. Briefly discuss about different services provided by K2 CO4
Pretty Good Privacy (PGP).
5. What are different cryptographic algorithms used in K1 CO4
S/MIME? Explain how S/MIME is better than MIME.
6. Write short notes on authentication header and ESP K4 CO4
K
Q.NO QUESTIONS CO’s
LEVEL
1. Explain in detail the operation of Internet Key Exchange K2 CO4
with an example.
2. Describe about SSL/TLS Protocol. K3 CO4
SYLLABUS
UNIT V
Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall Characteristics
Types of Firewalls, Firewall Basing, Firewall Location and Configurations. Blockchains, Cloud Security and IoT
security
PART -A
K
Q.NO QUESTIONS CO’s
LEVEL
1. What are the limitations of firewalls? K1 CO5
11. How does an IDS differ from an IPS (Intrusion Prevention K2 CO5
System)?
12. What is the purpose of a DMZ in network security? K1 CO5
2. K2 CO5
Explain password management.
5. K3 CO5
Write a neat diagram explain the various components of
IoT framework.
6. K3 CO5
Discuss the various SecaaS Categories of service offered
by the service provider for cloud security with examples.
7. K2 CO5
Explain in detail the elements of typical block in blockchain.
(6)
8. K3 CO5
Describes the characteristics of pocket filtering firewall
along with its advantages and limitations.
9. Define and describe the purpose of firewalls, including K2 CO5
their characteristics and different types
10. Explain the differences between Intrusion Detection CO5
Systems (IDS) and Intrusion Prevention Systems (IPS) K2
with suitable examples.
11. List and describe common IoT security threats and their K2 CO5
impact on network security.
12. Explain the significance of network segmentation in IoT K3 CO5
security.
13. Explain the shared responsibility model in cloud K2 CO5
security for SaaS, PaaS, and IaaS services.
PART-C
1. Explain the firewall design principles. K2 CO5