We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
BCACAC-382 -Network Security & Management
UNIT
Questions carrying 2 Marks
‘What is the need of network security?
‘What is DoS attack?
What are the qualities of good network?
List the qualities of good network.
What are the algorithms used in digital signature?
Differentiate fabricate and intercept.
‘What are the components of infrastructure security?
What does accounting mean?
What is the difference between Plain text and Cipher text?
|. What is the difference between encryption and decryption?
|. Expand PCM, IDEA, CVSD, DES.
1. What is Digital Signature?
’. Differentiate Authorization and authentication.
14, What are management principles?
15, Define data integrity.
16. What is cryptanalysis?
17. Why network security policy is important?
18. What is secret information? Give example.
19. What are the goals of security infrastructure?
20. Differentiate public key and secret key cacryption.
Beer eee
Long Answers Questions (5 or 6 marks)
Why network security is needed and how to maintain?
‘Explain the various security attacks.
Explain the different classes of information policy.
Write a note on management principles with respect to network security.
Write a note on network security principles.
Explain security policies, standards and guidelines.
Explain the qualities of a good network.
Explain the categories of security policy.
‘Explain the various components of infrastructure security.
|. Why security procedure should be implemented?
|. Differentiate physical access control and logical access control
. Define cryptosystem. Differentiate symmetric and asymmetric cryptosystem.
}. Define cryptanalysis. What are its purposes?
|. Write a note on speech secrecy system.
.. Describe the goals of infrastructure security.
YR NAY ee EE
BREE
BE
Page 9 of 1716. Explain different categories of data encryption methods.
17. Explain the three types of cryptographic algorithms.
18. Write a note on physical securities.
19, Write a note on design guidelines.
20. Write a note on speech coding scheme.
21. Write note on stream and block ciphers.
22. Explain the three types of cryptographic algorithms.
UNI
PI
Questions carrying 2 Marks
1. What are the requirements of secured system?
2. What are the common hardware problems?
3. Mention the safeguards for hardware problem.
4. What is smart card?
5. What is VPN?
6. Define iris map and facial thermograph.
7. Mention the properties of software security.
8. Expand PPTP, L2FP, L2TP, IPSec.
9. What is inference control?
10. Differentiate physical database integrity and logical database integrity.
11. What is Data Warehous
12. Define information system.
13. Define distributed network.
14, What is distributed compating system? Represent diagrammatically.
15. Define spyware and computer virus.
16. What is spoofing and snipping?
17. What is patch management?
18. What is Trojan horse?
19. What are the objectives of network security?
20. What are network assets?
21. What is logic bomb?
22. What are the safeguards to malicious software?
23, What is password snipping?
24. List some network vulnerabilities.
25. Define firewall. Give some example.
26. What is the difference between active attack and passive attack?
Long Answers Questions
1. Write a note on hardware security.
2. Explain the various biometric identification methods.
3. Explain user VPNs.
Page 10 of 17,4. Explain site VPNs.
5. Explain Point to Point tunneling protocol
6. Explain Layer 2 Forwarding Protocol.
7. Explain IPSec
8 Explain Layer 2 Tunneling Protocol.
9. How smart cards help to security? How companies using it?
10. Explain software security.
11. List and Explain Database security requirements.
12. Write a note database security issues.
13. Describe vendor specific security.
14, How to identify data vulnerabilities? Explain database backup and recovery.
15, Write a note static and dynamic web page.
16. Describe Database security.
17. List and explain various system vulnerabilities.
18. Write a note management framework of security and control.
19. How to achieve secure electronic transactions? Explain.
20. Describe the SET standard.
21. List and explain the major threats to an organization.
2. List and explain the objectives of information security.
23, Explain the different ways of authenticating user's identity.
24, Write a note access control.
25, Discuss attack on internet protocol and internet services.
26. Describe malicious software.
27. Explain the model for network security.
28. Describe the types of firewall.
29, Explain the limitations of firewall.
UNIT -IIL
Questions carrying 2 Marks
1. Expand SSL, TLS, SET, S-HTTP.
2. What is the importance of web security?
3. Mention the role of HTTP.
4. What is the difference between HTTP and S-HTTP?
5. What are the services of SET?
6. What is the goal of network management?
7. List the applications of OSI network management.
8. Expand ICMP, SNMP, PING, and CMIP.
9. What is performance management?
10. What is the need of configuration management?
11. Define the terms object, agent and manager.
Page 1a of 1712. List the issues addressed by security plan.
13. What are the basic goals of network security system?
14. What is the role of security management?
15, What is change management?
16. Draw OSI network management model.
17. How SSLis useful in web security?
18. How to manage fault in network?
19. What is the difference between SNMP and SMPv2?
20. List the common threats to storage media.
Long Answers Questions
1. Explain the client server architecture for web.
Write a note on various approaches of web traffic security.
Write a note on S-HTTP.
‘Explain the importance of SSL/TLS for secure web services.
5. Explain SET.
6. Explain network management model.
7. Explain the basic goals of network management.
8. Explain OSI network management application.
9. Explain SNMP architecture.
10. Write a note SNMP commands.
1. What is security plan? Explain the issues.
12. Explain the need of security analysis.
13. What is change management? Explain.
14, How to manage change control across organization? Explain.
1, Explain Capability Maturity Model.
16. Write a note on systems security management.
17. Write a note on SNMPv2.
18. Describe SNMP commands.
19. Explain disaster recovery.
20. Why protection of storage media is important for organization? Explain.
bep
UNIT-IV
Questions carrying 2 Marks
1. What is risk management?
2. What is breach of confidentiality?
3. What is cybercrime?
4. What are the legal threats to network?
5. What is the need of E-mail policy?
6. What are Email protections?
7. Define electronic mail system.
Page 12 of 178. What are the services provided by PGP?
9. What are the two modes of internet banking?
10. Write the layer of internet banking.
11. What is the important of post information security incident review?
12. What is containment and eradication?
13. How to identify threats and vulnerabilities?
14, List some countermeasures to risk.
15. List the factors that affects the incident classification.
16. What is contract’?
17. Who can file a complaint?
18, What are the services provided by PGP?
19. What are the security threats to internet banking system?
20. What is the important of firewall in internet banking?
Long Answers Questions
1. How to analyze the risk? Explain.
2. How to identify the risk to an organization? How to deal it?
3. Explain incident management.
4. Explain risk analysis.
5. Explain incident response process.
6. Explain the strategies of risk reduction.
7. Explain information technology act 2000.
8. Explain cybercrime and the IT act, 2000.
9. Explain Indian contract act 1872.
10. Write a note Indian penal code.
11. Write a note on consumer protection act 1986.
12. Explain Indian copyright act.
13. Describe various Email threats an organization faces.
14. Explain PGP for email security.
15. Describe the schematic flow of internet banking.
16. Explain the layered approach to security.
17. Explain the planning decision flow chart for risk management.
18. Explain the various countermeasures to tisk.
19. Explain the classification of incident.
20. Explain the need of E-Mail Policy.
Page 13 of 17