Network Security - Unit Wise Questions

Questions Organized by Units
Unit 1: Computer Network Security Fundamentals
41 Questions

1. Define passive attack and active attack. Explain the OSI security architecture.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

1. How can you differentiate data integrity from system integrity? Briefly discuss the catagories of security services.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

1. What is nonrepudiation of origin? How connection confidentiality differs from connectionless confidentlity?

2+4 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

1. Explain the basic computer security with example.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2. What are the disadvantages of asymmetric cryptography ? Describe the components of Public Key Infrastructure.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2. What is the role of CRL issuer in public key infrastructure? How revocation request and cross certification functions are executed in PXIX?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

2. What is the use of master (permanent) keys in security? Write a protocol to share public keys using public-key authority scheme.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. What are the principle differences between version 4 and version 5 of Kerberos? Differentiate between pre-shared key and extensible authentication protocol for authenticating devices onto a wireless networks.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. Explain the distribution of public keys with practical example.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4. Explain different services provided by PGP.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. Assume an open distributed network environment in which users at workstations wish to access services on servers distributed throughout the network. Now discuss how you can use Kerberos protocol for secured service communication between users and servers in the environment.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

3. What do you mean by reply attack? Discuss the roles of Authenticating Server and Ticket Granting Server in Kerberos protocol.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4. Explain the user authentication principles with example.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4. What is the use of identity in network security? Describe the principal elements of an identify management system.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

4. What basic security services do the SSL Record Protocol provides for SSL Connections? Mention details of the operations that the SSL Record Protocol executes for ensuring the basic security services.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. Explain the principle categories of SET participants.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. Define a conection state in SSL. How Alert Protocol is used to convey SSL-related alerts to the peer entity in SSL connection?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. What do you mean by local forwarding in SSH? Describe about the possible channel types recognized in SSH Connection Protocol specification.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. What type of vulnerability ensure of cyber security? List the types of SSL protocols.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. Why variable padding length is used in TLS? In SSH, how User Authentication Protocol authenticates clients.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. How accidental and maliclous associations can be threats to wireless networks. Describe the approaches to provide WAP End-to-End Security.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

5. What do you mean by transport-level security? Explain with example.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

6. What do you mean by secure shell(SSH)? Explain.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. What does IP security policy means? Why does ESP include a padding field?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. What services are defined under IEEE 802.11i RSN security specification? Discuss to IEEE 802.11i phases of operation for Authentication and Association.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. Explain the wireless transport layer security with example.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. Define public key certificate. List the requirements for the use of public key certificate scheme.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

7. Discuss IEEE 802.11i phases of operation?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9. What are web security issues? Describe remote user authentication principles.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. What functionalities PGP provides for mail security? How PGP ensures confidentiality and authentication services?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. How can you secure the electronic mail? Explain with example. 

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

8. How PGP provides E-mail compatibility feature? What is the use of S/MIME?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. Write short notes on(Any Two)

a. DKIM

b. Transport mode and tunnel mode

c. Secure Shell(SSH)

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9. What do you mean by IP security? Explain IP security in brief.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9.Differentiate between Transport and Tunnel Mode. Briefly describe the fields of an Encapsulating Security Payload (ESP) packet.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

9. Explain benefits of using IPsec. How IPSec Protocol processes outbound packets?

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. What is cyber crime? Discuss various kinds of cyber crime attacks.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. Differentiate between security Attacks and security services.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

10. Define cyber security and cyber war.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

11. Discuss OSI security Architecture.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

11. Explain in brief about Cyber security.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

Unit 2: User Authentication
1 Questions

2. Explain the model for Network Security.

6 marks
Details
Official Answer
AI Generated Answer

AI is thinking...

Unit 3: Transport Level Security
0 Questions
Unit 4: Wireless Network Security
0 Questions
Unit 5: Electronic Mail Security
0 Questions
Unit 6: IP Security
0 Questions
Unit 7: Network Endpoint Security
0 Questions
Unit 8: Cloud and Internet of Things (IOT) Security
0 Questions