0% found this document useful (0 votes)
43 views6 pages

CS QB End

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 6

Cyber Security Question Bank

(AI&DS, SPPU)

UNIT – I

1. Define information security. Enlist and explain the elements of information security.
2. What is security policy? How can it be implemented?
3. Explain the techniques to achieve information security.
4. Enlist and explain steps required for implementing information security.
5. Define security. Explain the categories of security briefly.
6. Define network security. Explain operational model of network security in detail.
7. Enlist and explain basic terminologies in network security.
8. What are the different threats and vulnerabilities in case of network security? Explain in
detail.
9. Distinguish between privacy and security.
10. Write Short Note on:
A. Information Security
B. Network Security
C. Privacy Vs. Security
UNIT – II
1. Introduce the concept of data encryption techniques and standards.
2. Enlist and explain encryption methods.
3. Define cryptography. Explain cryptography technique in detail.
4. Enlist and explain types of Ciphers used in encryption.
5. Define Stenography. Describe its applications and limitations.
6. What does Block Ciphers mean? Explain the methods of operation of block ciphers.
7. Write and explain Data Encryption Standard (DES) algorithm.
8. What is Data Encryption Standard? Explain Triple DES in detail.
9. Explain Data Encryption Standard with the help of example.
10. Describe the criteria for DES Design.
11. Explain the concept of weak keys in DES algorithm.
12. Write and explain Advance Encryption Standard (AES).
13. Distinguish between Data Encryption Standard (DES) and Advance Encryption Standard
(AES).
14. Write a Short note on:
A. Asymmetric vs. Symmetric Encryption
B. Feistal Cipher
C. DES vs. AES
D. Transposition Ciphers
E. Substitution Ciphers
UNIT – IV

1. Explain the concept of public key cryptography.


2. Explain the RSA algorithm in detail with the help of diagram.
3. Describe the Deffie-Hellman Key Exchange in detail.
4. What is RSA algorithm? Explain the Key Distribution of RSA algorithm.
5. Explain the Key length and Security in case of RSA algorithm.
6. What is elliptic curve arithmetic in cryptography? Explain in detail.
7. Enlist and explain the authentication methods.
8. What are the authentication types? Explain types of user authentications.
9. Explain message digest algorithm in detail.
10. What is message digest in digital signature? Explain its working in detail.
11. Define Kerberos. Explain the working of Kerberos authentication services.
12. What is X.509 certificate? Explain the X.509 authentication service.
13. Distinguish between Kerberos and X.509 authentication service.
14. Write a short note on:
A. Cryptography
B. Security
C. RSA Algorithm
15. Discuss the concept of Digital Signatures along with the algorithms used.
16. Explain the implementation of digital signature.
17. What is Digital Signature Standard? Explain the DSS approach.
18. Explain the Authentication Protocol used in digital signatures.
UNIT – IV

1. Define IP security. Draw and explain the architecture of IP security .

2. Explain following protocols and their operations:

A. IPv6

B. Ipv4
C. IPCC
3. What are different protocols used in IP security. Explain each protocol briefly.
4. What is web security? Explain in detail.
5. Define Secure socket layer (SSL). Explain SSL record protocol briefly.
6. Explain the working of SSL session and connection
7. What is change cipher spec protocol? Explain in detail .
8. Enlist and explain protocols used in web security.
9. What is Electronic mail security? Explain the concept of pretty good privacy.
10. Explain the concept of MIME and S/MIME.
11. Distinguish between MIME and S/MIME.
12. Explain the concept of secure electronic transaction
13. Write a short note on:
A. AH protocol
B. ESP protocol
C. ISKAMP protocol
D. Oakkey determination protocol
14. Explain the concept of virtual private network used for IP security
15. Write a short note on:
A. MIME Vs. S/MIME
B. Handshake protocol
C. SSL record protocol
UNIT – V
1. Explain the concept of and intrusion
2. What is computer intrusion? Explain the concept in detail.
3. What are the characteristics and and types of firewall?
4. What is computer firewall? Draw and explain Firewall architecture.
5. What is trusted system and access control? Explain in detail.
6. What is intrusion detection explain the concept in short.
7. What is intrusion detection system and how does it work?
8. Define Intrusion detection system. What are the functions of vision detection system?
9. Explain the methods of intrusion detection system.
10. What is intrusion detection system? Explain the need of intrusion detection system.
11. Describe how the passport management can be used.
12. Enlist and explain the limitations and challenges of intrusion detection system.
UNIT – VI

1. Explain the concept of confidentiality and cyber forensic.


2. What do you mean by personally identifiable information? Explain the use of PII in terms of
confidentiality and cyber forensic.
3.What is cyber stalking? Describe back levels of cyber stalking.
4. Define cyber stalking. Give Examples of cyber stalking.
5. Describe the concept of Cyber crime.
6. Explain the concept of PII confidentiality safeguards.
7. What is information Protection law? Explain the IPL law in terms of Indian perspective.
8. Write a short note on
a. Information Protection Law
b. Cyber Stalking
c. Cyber Crime
d. Cyber Forensic

You might also like