Network Security 2078
Attempt all questions.
1. Define passive attack and active attack. Explain the OSI security architecture.
2. What are the disadvantages of asymmetric cryptography ? Describe the components of Public Key Infrastructure.
3. What are the principle differences between version 4 and version 5 of Kerberos? Differentiate between pre-shared key and extensible authentication protocol for authenticating devices onto a wireless networks.
4. Explain different services provided by PGP.
5. Explain the principle categories of SET participants.
6. What type of vulnerability ensure of cyber security? List the types of SSL protocols.
7. What does IP security policy means? Why does ESP include a padding field?
8. Define public key certificate. List the requirements for the use of public key certificate scheme.
9. What are web security issues? Describe remote user authentication principles.
10. Write short notes on(Any Two)
a. DKIM
b. Transport mode and tunnel mode
c. Secure Shell(SSH)