0% found this document useful (0 votes)
154 views2 pages

Question Bank On Information Security

This document contains questions on various topics related to information security including elements of information security, operational security models, classification of security attacks, security policies, the difference between security and privacy, cryptanalysis techniques like linear and differential cryptanalysis, steganography applications and limitations, encryption techniques like Hill cipher, transposition cipher, Playfair cipher, block cipher modes, AES, DES algorithms, monoalphabetic and polyalphabetic ciphers, hash functions, digital signatures, elliptic curve cryptography, authentication methods, key exchange, Kerberos, RSA encryption, IPsec, VPNs, SSL, firewall types and limitations, intrusion detection systems, password management practices, cyber forensics phases, personally identifiable information, information protection laws.

Uploaded by

Rushi sawant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views2 pages

Question Bank On Information Security

This document contains questions on various topics related to information security including elements of information security, operational security models, classification of security attacks, security policies, the difference between security and privacy, cryptanalysis techniques like linear and differential cryptanalysis, steganography applications and limitations, encryption techniques like Hill cipher, transposition cipher, Playfair cipher, block cipher modes, AES, DES algorithms, monoalphabetic and polyalphabetic ciphers, hash functions, digital signatures, elliptic curve cryptography, authentication methods, key exchange, Kerberos, RSA encryption, IPsec, VPNs, SSL, firewall types and limitations, intrusion detection systems, password management practices, cyber forensics phases, personally identifiable information, information protection laws.

Uploaded by

Rushi sawant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

1. List and explain various elements of Information security.

[5]
2. Explain operational Security Model for network security [5]
3. How Information Security attacks are classified? Give example for each [5]
4. What are different security policies? Explain [5]
5. List the difference between Security and Privacy [5]
6. Describe linear and differential cryptanalysis with suitable example. [5]
7. What is steganography? What are the applications and limitations of steganography? [5]
8. Using Hill Cipher encrypt the message ‘ESSENTIAL’. The key for encryption is ‘ANOTHERBZ’.
[5]
9. Use Transposition Cipher to encrypt plain text ‘I Love my India’ and use the key ‘HEAVEN’.
[Use single columnar transposition] [5]
10. What is block Cipher? Explain counter mode of block Cipher. [5]
11. Explain working of AES in detail. [5]
12. Use PlayFair Cipher to encrypt the message "This is a columnar transposition". Use key- APPLE.[5]
13. Explain following algorithm modes [5]
 i) ECB
 ii) OFB
14. Explain the operation of DES algorithm in detail. [5]
15. Explain Monoalphabetic & Polyalphabetic ciphers with appropriate examples. [5]
16. What is Transposition Cipher? Use Transposition Cipher to encrypt theplain text “WE ARE THE
BEST” use key “HEAVEN” [5]
17. Write note on application and limitation of stenography. [5]
18. Explain digital signature standard [5]
19. Describe Elliptic Curve Cryptography [5]
20. What is Block cipher? Explain counter mode of block cipher. [5]
21. Write note on application and limitation of stenography [5]
22. Discuss elliptic curve cryptography in detail. [5]
23. What is block Cipher? Explain counter mode of block Cipher. [5]
24. What is authentication? Explain various methods authentication. [5]
25. Explain working of AES in detail. [5]
26. Find the key exchanged between Alok and Bobby considering following data. [5]
N=11
g=5
X=2, Y=3 Find the value osf A B and secret key K.
27. What is Kerberos ? Explain operation in detail. [5]
28. Given two prime numbers P=17 & Q=29 find out N,E,& D in an R SA encryption process. [5]
29. Explain in details the need & Implementation of one way hash function ( MD5) [5]
30. Discuss the working of IPSec. What are the benefits of IPSec [6]
31. What is VPN? Explain types of VPN [6]
32. Compare PGP, MIME and S/MIME. [6]
33. Differentiate between IP-V4 and IP-V6. [4]
34. Explain secure socket layer handshake protocol in detail [7]
35. Explain ISAKMP protocol of IPSec with header format. [7]
36. What is Backdoors and Key Escrow in PGP? [9]
37. Describe IPsec protocol with its components and security services [8]
38. Explain OAKLEY key determination protocol. [9]
39. Explain Secure Electronic Transaction in detail. [8]
40. Describe briefly how IPsec works and enlist its applications. Distinguish between tunnel and
transport mode of Ipsec [8]
41. What are the various types of firewall. Discuss limitations of firewall. [8]
42. Explain any two password management practices. [4]
43. What is trusted system. [4]
44. Explain need and challenges of intrusion detection system. Define signature based IDS. [8]
45. What is access control security services. [4]
46. Explain packet filtering firewall. [4]
47. List and explain types of intrusion detection system(IDS) [9]
48. Describe screened subnet fire wall architecture. [8]
49. Explain the firewall types with its operation [9]
50. Explain operation of anomaly based intrusion detection system in detail? [8]
51. Describe briefly IPSec work and enlist its application distinguish between tunnel and transport mode
IPSec [8]
52. Explain in detail password management practices [9]
53. What are various types of firewall? Discuses limitation of firewall [9]
54. Explain need and challenges of intrusion detection system . define signature based IDS [8]
55. What is cyber stalking? How to identify and detect cyber stalking. [8]
56. What are different phases of cyber forensics? Explain with suitable diagram. [8]
57. Discuss PII confidentiality safeguards [8]
58. HOW war dialing software are used in remote connectivity? [8]
59. How VoIP hacking is done by attackers ? what are the counter measures for it? [8]
60. What is VLAN jumping? What are countermeasure used for it ? [8]
61. Explain various hacking devices used for hacking [8]
62. Discuss PII confidentiality safeguards. [8]
63. What is cyber stalking ? how to identify and detect cyber stalking. [8]
64. Explain personally identifiable information PII. Describe PII impact levels with examples? [8]
65. Write note on information protection law : Indian perspective [8]

You might also like