0% found this document useful (0 votes)
34 views2 pages

CNS Unit Wise QB

This document contains question banks for 6 units on the topics of Computer Networks and Security. The units cover: 1. Designing routing protocols for ad-hoc wireless networks and challenges. Protocols discussed include MACAW, AODV, and DSDV. 2. Types of network attacks (active vs. passive), stream ciphers, substitution ciphers, and principles of information security. 3. Symmetric and asymmetric encryption algorithms including RSA, DES, AES. Digital signatures and Diffie-Hellman key exchange. 4. PKIX architecture model and key establishment schemes. 5. Comprehensive cyber security policies and differences between information security vs cyber security. Hardware vs software

Uploaded by

Harshal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

CNS Unit Wise QB

This document contains question banks for 6 units on the topics of Computer Networks and Security. The units cover: 1. Designing routing protocols for ad-hoc wireless networks and challenges. Protocols discussed include MACAW, AODV, and DSDV. 2. Types of network attacks (active vs. passive), stream ciphers, substitution ciphers, and principles of information security. 3. Symmetric and asymmetric encryption algorithms including RSA, DES, AES. Digital signatures and Diffie-Hellman key exchange. 4. PKIX architecture model and key establishment schemes. 5. Comprehensive cyber security policies and differences between information security vs cyber security. Hardware vs software

Uploaded by

Harshal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

AY 2021-2022 (SEM-II)

Question Bank
Subject: - Computer Networks and Security

Unit-3
1. Explain the issues in designing a routing protocol for Ad-hoc Wireless Network.
2. What is Adhoc Network? Explain challenges in designing Routing Protocol for Adhoc
wireless networks.
3. Explain MACAW protocol in details.
4. What are hidden station and exposed station problem in WLAN.
5. Differentiate between infrastructure network and infrastructure less network and What
are issues in Adhoc wireless network?
6. Explain routing protocols in detail.
7. What are the MAC layer and Routing Layer Design goals?
8. Explain the connection establishment and data transfer phase in the following routing
protocols with suitable diagram.
i) AODV
ii) DSDV

Unit-4
1. What is network attack? Write short note on following with suitable example?
a) Active attack b) Passive attack
2. What is stream cipher? Explain encryption process using stream cipher with suitable
example
3. What is substitution cipher? Explain the mono alphabetic and poly alphabetic cipher with
suitable example
4. Describe the following fundamental principles of Information security 1.
Confidentiality & Privacy, 2. Authentication, 3. Authorization and Access Control, 4.
Integrity, 5. Non- repudiation
5. What is Electronic Code book (ECB)? Explain the process of ECB with suitable diagram
6. Describe the following network security threats
a) Unauthorized access b) Distributed Denial of Service (DDoS) attacks c) Man in the
middle attacks
7. What is Cipher Feedback Mode (CFM)? Explain the process of CFM with suitable
diagram
8. What is Cipher Block Chaining (CBC)? Explain the process of CBC with suitable
diagram

Unit-5
1. Explain RSA with suitable example.
2. Explain the working of DES with suitable example.
3. Explain the working of AES with suitable example.
4. Describe how digital signature works with suitable diagrams.
5. Explain Diffie Hellman algorithm with suitable example.
6. Write short note on
a. Hash Functions b) Symmetric key algorithm c) Asymmetric key algorithm
7. Explain the different key establishment schemes
8. Explain the PKIX architecture Model

Unit-6
1. Describe Comprehensive Cyber Security Policy in detail
2. What is the difference between Information security and cyber security? Explain the
different layers of security?
3. What is the difference between hardware attack and software attack? Write a note on
MIM, DoS attack
4. Explain the concept of Cyber Stalking, Cyber Terrorism in detail
5. Write a note on
1. Malware 2. Phishing 3. MIM Attack
6. Elaborate different cyber security policies in brief
7. Explain the different Internet Governance – Challenges and Constraints

You might also like