Cryptography - Unit Wise Questions

Unit 1: Introduction and Classical Ciphers
36 Questions

        a. The larger the size of key space, the more secures a cipher? Justify your answer.

2 marks | Asked in 2075

        a. Suppose a key logger program intercepts user password and is used to modify the user account. Now, justify whether it’s a violation of confidentiality, integrity, or availability or some of combination of them. 

2 marks | Asked in 2071

        a. List and briefly define types of cryptanalytic attacks based on what is known to the attacker.

2 marks | Asked in 2067

        a. Difference between monoalphabetic substitution ciphers and polyalphabetic substitution ciphers.

2 marks | Asked in 2070

        a. All classical ciphers are based on symmetric key encryption. What does that mean?

2 marks | Asked in 2068

        a. How monoalphabetic substitution differs from polyalphabetic. Briefly define with suitable example.

2 marks | Asked in 2069

        b. What do you mean by reply attacks? Describe with an example. 

2 marks | Asked in 2073

        b. The larger the size of the key space, the more secure a cipher? Justify your answer.

2 marks | Asked in 2067

        c. What is the importance of Trap Door function in cryptography?

2 marks | Asked in 2076

        b. What are the two building blocks of all classical ciphers?

2 marks | Asked in 2070

        b. What makes Vigenere cipher more secure than say, the Playfair cipher?

2 marks | Asked in 2068

        d. Differentiate between transposition cipher and substitution cipher?

2 marks | Asked in 2075

        c. Mention the advantages of using stream ciphers over block ciphers. 

2 marks | Asked in 2071

        d. how Vignere Cipher can be used to ensure poly-alphabetic substitution?

2 marks | Asked in 2074

            d. Define each of the terms confidentiality, integrity and availability. 

2 marks | Asked in 2072

        d. What are the characteristics of a stream cipher?

2 marks | Asked in 2067

        d. How chosen plaintext attack differs from chosen ciphertext attack?

2 marks | Asked in 2069

5. Distinguish between stream cipher and block cipher. Encrypt the message WE ARE IN SAME RACE UNTIL OUR LIVE END using Rail fence cipher using 4 as number of rails.

5 marks | Asked in 2076 (new)

        g. John obtains Peter's credit card number and performs shopping. Does it violate confidentiality or integrity or both? Justify.

2 marks | Asked in 2076

        g. John copies Mary’s homework. Does it violate confidentiality or integrity or both? Justify.

2 marks | Asked in 2075

        g. Give an example for a situation that compromise in confidentiality leads to compromise in integrity.

2 marks | Asked in 2069

2.

    a) What do you mean by transposition cipher? Decrypt the ciphertext UIESTNVRIY using the Railfence cipher using the rail size 2.

4 marks | Asked in 2074

    b) Encrypt the message “MEET ME TONIGHT” using the Hill cipher with the key Show your calculations and the result.

4 marks | Asked in 2072

    b) Construct a playfair matrix with the key “KEYWORD”. Using this matrix encrypt the   message “WHY DON’T YOU”.                                                                                            (4)

4 marks | Asked in 2069

    b) Construct a playfair matrix with the key CRYPTO. Using this matrix encrypt the message "have a nice day".

4 marks | Asked in 2074

3.     a) Configure a Vigenere table for the characters from A-H. Use the table to encrypt the text DAD CAFE EACH BABE using the key FADE.                                                      [4]

 

4 marks | Asked in 2071

    b) Construct a playfair matrix with the key EXAMPLE. Using this matrix encrypt the message “Hide the Gold”.                                                                                                 

4 marks | Asked in 2073

4. a. Encrypt the message "computing for human life" to playfair cipher using key "BSCCSIT".

5 marks | Asked in 2076

11. Write down any two limitations of MAC? What does policy and mechanism mean in cryptography? Describe with a scenario.

5 marks | Asked in 2076 (new)

4.     a) Encrypt the message “help” using the Hill cipher with the key . Show your calculations and the result.  [4] 

4 marks | Asked in 2071

4. a) Encrypt the message “machine passed turing test” to playfair cipher using key “ALANTURING”.                                                                                                             

5 marks | Asked in 2075

    b) Encrypt the message "Eight Ten" using the Hill cipher with the key . Show your calculations and the result.

4 marks | Asked in 2074

    b) Given the plaintext ”LOST IN PARADISE”, compute the ciphertext for

i. The Ceaser cipher with key = 5

            ii. The Railfence cipher with rails = 4                                                                         

4 marks | Asked in 2072

    b) Encrypt the message “NANI” using the Hill cipher with the key Show your calculations and the result.                                                                                                 

6 marks | Asked in 2073

    b) Given the plaintext “ABRA KA DABRA”, compute the ciphertext for                       (4)

i. The Ceaser cipher with key = 8

ii. The Railfence cipher with rails = 3

4 marks | Asked in 2069

    b) Define field. Differentiate between public key cryptography and private key cryptography.                                                                                                                     

5 marks | Asked in 2075

Unit 2: Symmetric Ciphers
49 Questions

1. Among monoalphabetic and polyalphabetic cipher, which one is more vulnerable? Justify your statement. Which types of keys are considered as weak keys in DES? Explain round operations in IDEA.

10 marks | Asked in 2076 (new)

        a. Why the procedure used during encryption-decryption process of DES is often known as managing or criss-crossing? 

2 marks | Asked in 2073

        b. Find Multiplicative inverse of each nonzero elements in Z5.

2 marks | Asked in 2074

        c. Find Multiplicative inverse of each nonzero element in Z6. 

2 marks | Asked in 2073

              c. What is the purpose of S-Box in DES? 

2 marks | Asked in 2072

        c. Explain the concepts of diffusion and confusion as used in DES.

2 marks | Asked in 2067

        d. How many rounds are used in AES and what does the number of rounds depend on?

2 marks | Asked in 2076

        c. Des encryption was broken in 1999. Does that make this an unimportant cipher? Why do you think that happened?

2 marks | Asked in 2070

        c. What do you mean by avalanche effect?

2 marks | Asked in 2069

        d. What does a field have, that an integral domain does not? Why is Zn not an integral domain?

2 marks | Asked in 2070

        e. What does Zn refer to in cryptography? Illustrate with an example.

2 marks | Asked in 2075

        d. When does a set become a group?

2 marks | Asked in 2068

        e. What does Zn refer to in cryptography? Illustrate with an example.

2 marks | Asked in 2076

        e. Using extended Euclidean Algorithm, find multiplicative inverse of 550 and 1769.

2 marks | Asked in 2074

        e. What is the difference between the notation a mod n and the notation a ≡ b (mod n)?

2 marks | Asked in 2068

        f. What is the additive inverse of 2 in Z10?

2 marks | Asked in 2075

        e. Does a field contain a multiplicative inverse for every element of the field?

2 marks | Asked in 2070

        e. What do you mean by multiplicative inverse? Find multiplicative inverse of each nonzero elements in Z11.

2 marks | Asked in 2069

        f. Even though we have a strong algorithm like 3-DES, still AES is preferred as a reasonable candidate for long term use. Why?

2 marks | Asked in 2069

        f. What are the four steps that are executed in a single round of AES processing?

2 marks | Asked in 2070

        g. What do you mean by odd round in IDEA?

2 marks | Asked in 2074

2. a) What do you mean by “Fiestel Structure for Block Ciphers”? Explain.                       

5 marks | Asked in 2075

        g. How many rounds are used in AES and what does the number of rounds depend on?

2 marks | Asked in 2067

        g. Briefly describe SubBytes and ShiftRows in AES. 

2 marks | Asked in 2071

2.    a) The notation Zn stands for the set of residues. What does that mean? Why is Zn not a finite field? Explain.         (5) 

5 marks | Asked in 2067

2.     a) What do you mean by a "Feistel Structure for Block Ciphers"? Explain.                     (5) 

5 marks | Asked in 2068

2. a) Describe Extended Euclidean Algorithm. Use this algorithm to test whether any two number n1, n2 are co-prime or not?                                                   

4 marks | Asked in 2073

    b. Find the multiplicative inverse of 11 in Z26 using extended Euclidean algorithm.

5 marks | Asked in 2076

2.     a) What is Euclid’s algorithm for finding the GCD of two numbers? Explain.                (5)

OR

What is Euler’s theorem? What is the totient of a prime number? 

5 marks | Asked in 2070

    b) Consider the message blocks m1, m2, m3. If the Cipher Block Chaining mode DES encryption can be expressed as  Now, write the expressions for the DES decryption to extract each of the message blocks m1, m2, m3.

6 marks | Asked in 2074

3. a. Find the result of the following operations.

        i) 27 mod 5        ii) 36 mod 12        iii) -18 mod 14        iv) -7 mod 10        v) -13 mod 7

5 marks | Asked in 2076

       b) Find the multiplicative inverse of each nonzero element in Zn.                                   (5)

5 marks | Asked in 2067

9. Explain the procedure of mix column transformation in AES with an example.

5 marks | Asked in 2076 (new)

    b) How IDEA operates on 64-bit blocks using 128-bit key? Describe each round of operations that IDEA follows to generate ciphertext of a 64-bit input message block.    

6 marks | Asked in 2073

        b) Divide 23x2 + 4x + 3 by 5x + c, assuming that the polynomials are over the field Z7.      (5)    

5 marks | Asked in 2068

    b) Divide 5x2+4x+6 by 2x+1 over GF(7).

5 marks | Asked in 2075

          b) Calculate the result of the following if the polynomial are over GF(2):                       (5)

    (x4 + x2 + x + 1) + (x3+1)

    (x4 + x2 + x + 1) – (x3+1)

    (x4 + x2 + x + 1) x (x3+1)

    (x4 + x2 + x + 1) / (x3+1)

5 marks | Asked in 2070

3.     a) Let’s go back to the first step of processing in each round of AES. How does one look up the 16x16 S-box table for the byte-by-byte substitution?                                             (5)

5 marks | Asked in 2070

            OR

Complete the following equalities for the numbers in GG(2):

1+1 = ?

1-1 = ?

-1 = ?

1*1 = ?

1 * -1 = ? 

5 marks | Asked in 2067

3. a) Find the result of the following operations.            

    (i) 2 mod 5     (ii) 33 mod 3     (iii) -13 mod 10     (iv) -23 mod 10     (v) -8 mod 7

5 marks | Asked in 2075

            OR

What are the asymmetries between the modulo n addition and modulo n multiplication over Zn

5 marks | Asked in 2068

4. a) Briefly describe about MixColumns and AddRoundKey stages in AES. How many bytes in a state are affected by ShiftRows round?                                                         

6 marks | Asked in 2072

3.     a) Describe the ''mix columns'' transformation that constitutes the third step in each round of AES.                                                                                                                              (5)

5 marks | Asked in 2068

3.    a) What are the steps that go into the construction of the 16 × 16 S-box lookup table for AES algorithm?                                                                                                                 (5)

5 marks | Asked in 2067

5.     a) What is the purpose of S-Boxes in DES? Prove that DES satisfies complementation property?                                                                                                                            (6) 

6 marks | Asked in 2069

    b. Describe the "mix columns" transformation that constitutes the third step in each round of AES.

5 marks | Asked in 2076

    b) Describe the method for generating Round Constant table in AES algorithm in Add Round Key phase. Assume the number of rounds is 10.                                                   

5 marks | Asked in 2075

    b. List the modes of operation in cryptography? Describe the Fiestel cipher structure.

5 marks | Asked in 2076

    b) Determine whether the integers 105 and 294 are relatively prime. Explain your answer using Euclidean algorithm.                                                                                                (4)

4 marks | Asked in 2069

Unit 3: Asymmetric Ciphers
32 Questions

                a. What does Euler Totient function means? What will be the value of PHI (119)? 

2 marks | Asked in 2072

2. State the Fermat's theorem with example. Given the prime number p=29 and the primitive root g=8, private key of sender with X=9  and random integer K=11, encrypt the message m=13 using Elgamal cryptosystem.

10 marks | Asked in 2076 (new)

        c. AES is a block cipher. What sized blocks are used by AES?

2 marks | Asked in 2068

            e. What do you mean by primitive root of a prime number p? Is 3 a primitive root of 7? 

2 marks | Asked in 2072

4. Define discrete logarithm. Explain the procedure of sharing the secret key in Diffie Hellman.

5 marks | Asked in 2076 (new)

        d. What does Euler Totient Theorem states? What is the value of Totient(15)? 

2 marks | Asked in 2071

2. a. What is Fermat's Little theorem? What is the totient of a prime number? Give an example.

                OR

    Define primitive root of a prime number with a suitable example,

5 marks | Asked in 2076

2. a) In a RSA system, a user has chosen the primes 5 and 19 to create a key pair. The public key is {e=5, n=?} and the private key is {d=?, n=?}. Decide the private key {d, n}. Show encryption and decryption process for the message “TOGA”                                           

6 marks | Asked in 2072

        g. How do you define a prime number? When are two numbers A and B considered to be coprimes?

2 marks | Asked in 2068

2.     a) In public key cryptosystem, each of the communicating parties, in general, should know the public keys of each other before attempting security encryptions. How this can be achieved? Write a Public Key Authority Protocol for Public-key distribution among any two users.                                                                                                                    [4] 

4 marks | Asked in 2071

2.     a) Consider a Deffie-Hellman scheme with a common prime p = 11 and a primitive root g= 2.

i. Show that 2 is a primitive root of 11.

ii. If user A has public key Ya = 9, what is A’s private key Xa?

iii. If user B has public key Yb = 3, what is shared key K, shared with A.         (3x2=6) 

6 marks | Asked in 2069

                            OR

How can a number can be tested for primality testing using Miller-Rabin algorithm? Explain.

5 marks | Asked in 2075

10. what is the role of prime number in Euler totient function? Find the GCD of 12 and 16 using Euclidean algorithm.

5 marks | Asked in 2076 (new)

    b. How can RSA can be used for generating public and private key? Explain.

5 marks | Asked in 2076

    b) What do you mean by man-in middle attack? Is man-in-middle attack possible in Deffie-Hellman? How?                                                                                                      (5)

5 marks | Asked in 2070

    b) How can Diffie-Hellman can be used for key exchange? Explain.                               

5 marks | Asked in 2075

4.

    a) In a RSA system, a user named Messi has chosen the primes 5 and 11 to create a key pair. Now show the generation of public key pair (eMessi, n) and private key pair (dMessi, n). Show how Messi can encrypt the message "Soccer" using his own public key.

6 marks | Asked in 2074

4. a) In a RSA system, a user has chosen the primes 5 and 19 to create a key pair. The public key is (5, n) and the private key is (d, n). Decide the private key (d, n). Show encryption and decryption process for the message “Drogba”.                                                           

6 marks | Asked in 2073

       b) In RSA algorithm, what is necessary condition that must be satisfied by the modulus n chosen for the generation of the public and private key pair? Also, is the modulus made public?                                                                                                                                (5)

OR

5 marks | Asked in 2067

4.     a) Miller-Rabin algorithm for primality testing is based on a special decomposition of odd  numbers. What is that? Explain                                                                                         (5) 

5 marks | Asked in 2068

    b) Miller-Rabin test says that if a candidate integer n is prime, it must satisfy one of two special conditions. What are those two conditions?                                                          (5)

5 marks | Asked in 2070

5.  a) How do you create public and private keys in the RSA algorithm for public-key cryptography?          (5)

OR

5 marks | Asked in 2071

     b) In RSA algorithm, the necessary condition for the encryption key e is that it be coprime  to the totient of the modulus. But, in practice, what is e typically set to and why?            (5) 

5 marks | Asked in 2068

5.     a) How do you create public and private keys in the RSA algorithm for public-key cryptography?                                                                                                                    (5)

                                                OR

5 marks | Asked in 2070

      b) What is Fermat's Little Theorem? What is the totient of a number?                             (5) 

5 marks | Asked in 2067

6. a) How Man-In-Middle attack is possible in Deffie-Hellman Algorithm. Support answer with a numerical computation. Chose the required parameters with your own assumptions.

6 marks | Asked in 2073

6.

    a) Suppose there are two users Xavi and Persie who agreed to use Deffie-Hellman algorithm to exchange a key. Consider there is an eavesdropper Balotelli who attemps attack on the procedure. Show how Balotelli can perofrm Man-In-Middle attack in the Deffie-Hellman Key exchange protocol?

6 marks | Asked in 2074

    b) What do you mean by Man-in-Middle attack? Is man in middle attack possible in Diffie-Hellman algorithm for key exchange? How?                                                         

4 marks | Asked in 2072

5.     a) Miller-Rabin test for primality is based on the fact that there are only two numbers in Zp that when squared give us 1. What are those two numbers?                                       (5)

OR

5 marks | Asked in 2067

        b) How can public-key cryptography be used for document authentication?                     (5)

OR

       What seems so counterintuitive about the counter mode (CTR) for using a block cipher?

5 marks | Asked in 2068

What is discrete logarithm and when can we define it for a set of numbers?             (5) 

5 marks | Asked in 2067

         b) What is the Diffie-Hellman algorithm for exchanging a secret session key?               (5) 

5 marks | Asked in 2067

Unit 4: Cryptographic Hash Functions and Digital Signature
28 Questions

        a. How MAC differs from Hash? Is authentication and authorization refers to same term or different? Justify.

2 marks | Asked in 2076

                b. What properties does a good hash function should have? 

2 marks | Asked in 2072

3. Compare the SHA parameters between SHA-1 and SHA-2 family. Decrypt the cipher text DRJI with key  using Hill cipher.

10 marks | Asked in 2076 (new)

        c. Why Hash Functions are often known as one way functions?

2 marks | Asked in 2074

        c. What is weak collision resistance property of hash function?

2 marks | Asked in 2075

        d. Mention the image resistive properties of Hash functions. 

2 marks | Asked in 2073

6. Define digital signature. Describe the approaches of DSS.

5 marks | Asked in 2076 (new)

        f. How Message Authentication Codes differ from Hash Functions? 

2 marks | Asked in 2071

        f. What do you mean by one-time signatures? 

2 marks | Asked in 2073

        g. What is a hash code? Why can a hash function not be used for encryption?

2 marks | Asked in 2070

3.

    a) How padding is done in MD5? What enhancements in MD4 are done to get better hash function MD5?

6 marks | Asked in 2074

    b) What basic arithmetic and logical functions are used in SHA-1?                                 

5 marks | Asked in 2072

3. a) How padding is done in SHA-1? How 160-bit of hash value is generated by taking an input message of variable size using SHA-1?                                   

6 marks | Asked in 2073

        b) Mention the details of logical operations used in MD4. How the Majority function in Pass 1 of MD4 works?                                                                                                       [6] 

6 marks | Asked in 2071

4.     a) How Hash functions differ from MAC? Given a message m, discuss what arithmetic and logical functions are used by MD4 to produce message digest of 128 bits.           (2+4) 

6 marks | Asked in 2069

      b) What is the difference between algorithmically generated random numbers and true random numbers?                                                                                                                   (5)

5 marks | Asked in 2068

5.

    a) What is the use of digital signature? Discuss the working mechanism of Digital Signature Algorithm.

6 marks | Asked in 2074

    b) What is the digital signature for, authentication of confidentiality? Justify your answer. What does security handshake pitfall refer to?                                                                  

5 marks | Asked in 2075

        b) What do you mean by arbitrated digital signature? How signatures are generated using Digital Signature System?       [6]

6 marks | Asked in 2071

5. a. Does it possible to design collision free hash function? What does birthday attack refers to? Explain.

5 marks | Asked in 2076

5. a) Why hash functions are known to be best option for digital signature schemes? How about the use of encryption paradigms for generating digital signatures?                        

6 marks | Asked in 2073

6. a) Differentiate between direct digital signature and arbitrated digital signature. How signing and verifying process is done in Digital Signature Standard. 

6 marks | Asked in 2072

5.     a) What is meant by the strong collision resistance property of a hash function?               (5) 

5 marks | Asked in 2068

6.     a) What do you mean by digital signature? How digital signatures can be enforced using encryptions? Illustrate with an example.                                                                       (1+5)

6 marks | Asked in 2069

6. a) Is hash and MAC resemble the same meaning? Explain how SHA generates 160 bit digest value?                                                                                                                      

5 marks | Asked in 2075

6.     a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them.                                                                                                                    (5)

5 marks | Asked in 2070

6.     a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them.             (5) 

5 marks | Asked in 2071

      b) What is the relationship between ''hash'' as in ''hash code'' or ''hashing function'' and ''hash'' as in a ''hash table''?                                                                                                (5)  

5 marks | Asked in 2067

Unit 5: Authentication
5 Questions

        b. What are the components of authentication system? Give an example of authentication system.

2 marks | Asked in 2069

    b. Explain about the working mechanism of Kerberos.

5 marks | Asked in 2076

5. a) In which situation using Kerberos system seem to be good? Describe what the major components of Kerberos system are.                                                                             

6 marks | Asked in 2072

    b) What do you mean by password aging? How online dictionary attacks differ from offline attacks?

4 marks | Asked in 2074

    b) Define authentication system. How hardware based challenge response systems can be used as authentication approach.                                                                                       

4 marks | Asked in 2073

Unit 6: Network Security and Public Key Infrastructure
29 Questions

        f. List the five services that PGP operation is based on.

2 marks | Asked in 2076

        f. Define PKI Trust Model.

2 marks | Asked in 2074

               e. Differentiate session keys from interchange keys. 

2 marks | Asked in 2071

            f. Describe the concept behind public key infrastructure. 

2 marks | Asked in 2072

        f. What do you mean when we say that a pseudorandom number generator is cryptographically secure?

2 marks | Asked in 2067

        g. How security at application layer can be achieved? 

2 marks | Asked in 2073

7. What is the task of firewall? List the elements of X.509.

5 marks | Asked in 2076 (new)

3. a) Differentiate between SSL Session and SSL Connection. How SSL Record protocol provides confidentiality and message integrity.

5 marks | Asked in 2072

        b) How Kerberos Version 4 differs from Kerberos Version 5? How once per type of service approach is ensured by Kerberos Protocol.                                                           [6] 

6 marks | Asked in 2071

    b) Does Kerberos protocol ensures authentication and confidentiality in secure system? Explain.                                                                                                                              (5)

5 marks | Asked in 2069

    b) What is the role of SSL Handshake Protocol in Secure Socket layer Protocol?

4 marks | Asked in 2074

    b) List the participants of Secured Electronic Transaction (SET). Discuss the key features of SET.   

4 marks | Asked in 2072

4.     a) There are two aspects to a secure communication link: authentication and confidentiality. How do you understand these two words? Does the Kerberos protocol give us both?                                                                                                                      (5) 

5 marks | Asked in 2070

How is the sender authentication carried out in PGP?                                                (5) 

5 marks | Asked in 2067

    b) Discuss the five principle services provided by PGP protocol.                                    (4)

4 marks | Asked in 2069

    b) How SSL Record Protocol provides security in Secure Socket Layer Protocol?         

4 marks | Asked in 2073

5. a) Explain about PGP.                                                                                                 OR

      What is the role of the SSL Record Protocol in SSL/TLS? Explain.                             
5 marks | Asked in 2075

            OR

    What is the role of SSL Record Protocol in SSL/TLS? Explain.

5 marks | Asked in 2076

4.     a) What sort of secure communication applications is the Kerberos protocol intended for? Explain.                                                                                                                              (5) 

5 marks | Asked in 2067

    What are the notions Public Key Ring and Private Key Ring in PGP?

5 marks | Asked in 2071

What are the notions Public Key Ring and Private Key Ring in PGP? 

5 marks | Asked in 2070

6. a. Define digital signature. How certificates are issued in PKI trust models? Explain.

5 marks | Asked in 2076

        b) What is the difference between a connection and a session in SSL/TLS? Can a session include multiple connections? Explain the notions “connection state” and “session sate” in SSL/TLS. What security features apply to each?                                                               (5) 

5 marks | Asked in 2071

b) What is the difference between a connection and a session in SSL/TLS? Can a session include multiple connections? Explain the notions “connection state” and “session sate” in SSL/TLS. What security features apply to each?                                                          (5)

5 marks | Asked in 2070

6.     a) What is the role of the SSL Record Protocol in SSL/TLS? Explain.                              (5)

OR

How many layers are in the TCP/IP protocol suite for internet communications? Name the  layers. Name some of the protocols in each layer. 
5 marks | Asked in 2068

    b) What is a certificate and why are certificates needed in public key cryptography? (5) 

5 marks | Asked in 2070

    b) What does PGP stand for? What is it used primarily for? And what are the five services provided by the PGP protocol? 

5 marks | Asked in 2068

        b) What is a certificate and why are certificates needed in public key cryptography?     (5) 

5 marks | Asked in 2071

6.     a) We say that SSL/TLS is not really a single protocol, but a stack of protocols. Explain. What are the different protocols in the SSL/TLS stack?                                                   (5) 

5 marks | Asked in 2067

Unit 6: Malicious Logic
11 Questions

        a. What are the typical phases of operation of virus?

2 marks | Asked in 2074

        b. Differentiate between virus and worms.

2 marks | Asked in 2076

        b. Differentiate between virus and Trojan horse.

2 marks | Asked in 2075

        b. How zombies differ from logic bombs? 

2 marks | Asked in 2071

        e. How rabbits and bacterium can be malicious to a secure system? 

2 marks | Asked in 2073

        e. How afraid should you be of viruses and worms?

2 marks | Asked in 2067

            g. What are the possible phases that a virus can go through, during its life cycle? 

2 marks | Asked in 2072

        f. What is the difference between a virus and a worm?

2 marks | Asked in 2068

8. How does the nature of worms differ with virus? Define PKI with its architecture model.

5 marks | Asked in 2076 (new)

3.     a) How Trojan horse differs from viruses? Discuss about possible types of Trojan horses.                                                                                                                                    (2+3)

5 marks | Asked in 2069

12. Write short notes on (Any Two)

        a. Classes of intruder

        b. SSL

        c. Dos Attack

5 marks | Asked in 2076 (new)