Network Security 2075
Attempt any Ten questions.
1. What is nonrepudiation of origin? How connection confidentiality differs from connectionless confidentlity?
2. What is the role of CRL issuer in public key infrastructure? How revocation request and cross certification functions are executed in PXIX?
3. Assume an open distributed network environment in which users at workstations wish to access services on servers distributed throughout the network. Now discuss how you can use Kerberos protocol for secured service communication between users and servers in the environment.
4. What is the use of identity in network security? Describe the principal elements of an identify management system.
5. Define a conection state in SSL. How Alert Protocol is used to convey SSL-related alerts to the peer entity in SSL connection?
6. Why variable padding length is used in TLS? In SSH, how User Authentication Protocol authenticates clients.
7. Discuss IEEE 802.11i phases of operation?
8. How PGP provides E-mail compatibility feature? What is the use of S/MIME?
9. Explain benefits of using IPsec. How IPSec Protocol processes outbound packets?
10. What is cyber crime? Discuss various kinds of cyber crime attacks.