0% found this document useful (0 votes)
136 views4 pages

Is Question Bank

This document contains a question bank with previous year questions from 5 units related to information security. It includes questions from Parts A and B ranging from Blooms Taxonomy Level 1 (Remembering) to Level 6 (Creating). The questions cover topics such as cryptography, network security, authentication, encryption standards, public key infrastructure, secure email, and web security. For each unit, 10 short answer questions are provided in Part A and 3-10 longer answer/numerical questions are provided in Part B.

Uploaded by

Shaik Ubed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views4 pages

Is Question Bank

This document contains a question bank with previous year questions from 5 units related to information security. It includes questions from Parts A and B ranging from Blooms Taxonomy Level 1 (Remembering) to Level 6 (Creating). The questions cover topics such as cryptography, network security, authentication, encryption standards, public key infrastructure, secure email, and web security. For each unit, 10 short answer questions are provided in Part A and 3-10 longer answer/numerical questions are provided in Part B.

Uploaded by

Shaik Ubed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT-WISE QUESTION BANK/ PREVIOUS YEAR QUESTIONS (PART A & B)

BTL- Blooms Taxonomy Level:


Level 1-Remembering
Level 2- Understanding
Level 3- Applying
Level 4-Analyzing
Level 5- Evaluating
Level 6- Creating

PART-A& B

S. No Question Marks BTL Couse


Level

PART-A Unit 1
1 What is denial of service attack? 2 2 CO1
2 Discuss about cryptology and cryptanalyst. 2 2 CO1
3 Define Encryption and Decryption 2 2 CO1
4 What are replay attacks? 2 2 CO1
5 Discuss the key range and key size. 2 2 CO1
6 Define Asymmetric key cryptography. Writeits advantages 2 2 CO1
and limitations.
7 Compare substitution cipher with transposition cipher. 2 2 CO1
8 What is the man in the middle attack? 2 2 CO1
9 What is the need of Security? 2 2 CO1
10 What are two basic functions used in encryption algorithms? 2 2 CO1
PART-B Unit 1
1 Write the procedure of play fair cipher and consider the 10 4 CO1
following:2
Plaintext: “PROTOCOL”
Secret key: “NETWORK”
What is the corresponding cipher text using play fair
cipher method?
2 Explain various Security Services in detail. 10 2 CO1
3 List the various substitution cipher techniques and explain 10 2 CO1
any two with example.
4(a) Consider the following: 5 2 CO1
Plaintext: “HAMMER”
Secret key: “PROCEDURE”
What is the corresponding cipher text using play fair cipher
method?
4(b) Compare Symmetric and asymmetric key cryptography 5
5 List out the Principles of Security? Explain in detail 5 2 CO1
6 Discuss about the Security mechanisms. 10 2 CO1
7 What is Steganography? Explain various steganography 5 2 CO1
techniques.
8 Explain the Network security model with diagram. 5 2 CO1
9 Discuss in detail about various types of Security attacks with 5 3 CO1
neat diagrams.
10 Write the procedure of Hill cipher and explain with 5 2 CO1
example.
PART-A UNIT-2
1 What is electronic code Book? 2 2 CO2
2 Define Cipher Based Chaining mode. 2 2 CO2
3 What are the key ingredients of private key cryptography? 2 2 CO2
4 What is the drawback of Diffie and Helman key exchange 2 2 CO2
algorithm?
5 What is the requirements of hash functions? 2 2 CO2
6 Compare stream cipher and block cipher. 2 2 CO2
7 Write about strength of DES algorithm 2 2 CO2
8 What are the principles of public key cryptosystems? 2 2 CO2
9 How to convert block ciphers into stream ciphers? 2 1 CO2
10 Define stream cipher 2 2 CO2
PART-B Unit 2
1 Explain the AES algorithm. 10 3 CO2
2 Consider Diffie-Hellman Scheme with a common prime 10 4 CO2
q=11, and primitive root α=2
a) if user ‘A’ has public key YA=9, What is A’s private
key XA.
b) if user ‘B’ has public key YB=3, What is shared
secret key K .
3 a) Differentiate linear and differential crypto-analysis. 5 3 CO2
b) Describe in detail about Conventional Encryption model 5 2 CO2
4 What is Elliptic Curve Cryptography (ECC)? Discuss 10 3 CO2
ECC algorithm with neat diagram.
5 Briefly explain the characteristics and operations of 10 3 CO2
RC4 Encryption algorithm.
6 Explain DES algorithm with suitable examples. Discuss 10 2 CO2
its advantages and limitations.
7 Explain RSA algorithm with suitable example. 10 2 CO2
8 Discuss about Blowfish. 10 2 CO2
9 a) Draw Feistel cipher structure and explain in detail. 5 2 CO2
b) Perform encryption and decryption using the RSA 5 4 CO2
algorithm for the following
i)p=3, q=11, e=7, M=5
ii)p=5, q=11.e=3, M=9
10 What is block cipher? Explain various block cipher 10 2 CO2
modes of operation with neat diagram.
PART-A UNIT 3
1 What is a digital signature? 2 3 CO3
2 What is Kerberos? How it is used in security? 2 2 CO3
3 What is message digest? 2 2 CO3
4 What properties must a hash function have to be useful for 2 2 CO3
message authentication?
5 Explain Authentication using symmetric encryption 2 2 CO3
6 List three approaches to Message Authentication. 2 2 CO3
7 What are the requirements of authentication? 2 3 CO3
8 What is the standard (notation) used for defining X.509 2 2 CO3
certificate?
9 What is the drawback of authentication approach using 2 2 CO3
symmetric encryption?
10 Write a short note public key infrastructure (PKI). 2 2 CO3
PART-B Unit 3
1 Explain HMAC algorithm. 10 3 CO3
2 Explain Digital signature algorithm (DSA). 10 3 CO3
3 What is biometric Authentication? Explain various 5 2 CO3
biometric authentication techniques.
4(a) Describe various Digital signatures. 10 2 CO3
4(b) Discuss about CMAC. 5
5 Briefly explain about whirlpool algorithm 10 2 CO3
6 Explain approaches for Digital Signatures based on 10 2 CO3
public key Encryption?
7 Write short note on knapsack algorithm. 5 3 CO3
8 State the purpose of secure Hash functions. Discuss 10 2 CO3
secure hash Algorithm with suitable Example.
9 Illustrate X.509 authentication service. 5 2 CO3
10 Describe Kerberos version 4 and its authentication 10 2 CO3
dialogues.
PART-A UNIT – 4
1 What are the various PGP Services? 2 2 CO4
2 What is RFC 822? 2
3 Write a short note on transport mode and tunnel mode. 2 2 CO4
4 What are the different approaches to public-key 2 2 CO4
Management?
5 How does PGP provide public key management? 2 2 CO4
6 Give the features of Authentication Header? 2 2 CO4
7 Explain IP Security. 2 2 CO4
8 Explain about radix64 conversion? 2 2 CO4
9 Show the applications 0f IPSec. 2 2 CO4
10 How MIME is used in email services? 2 2 CO4
PART-B Unit 4
1 Discuss about authentication header. 5 2 CO4
2 Demonstrate combined security association. 5 3 CO4
3 Explain MIME context types. 5 2 CO4
4 Briefly discuss the services provided by Pretty Good 10 2 CO4
Privacy (PGP).
5 What are different cryptographic algorithms used in 5 2 CO4
S/MIME? Explain how S/MIME is better than MIME.
6 Write short note on Pretty Good Privacy. 5 3 CO4
7 Draw and discuss IP Security architecture. 10 3 CO4
8 Write a short note on S/MIME. 5 3 CO4
9 Discuss in detail encapsulating security payload. 5 3 CO4
10 Explain PGP Authentication mechanism with neat 5 2 CO4
diagram.
PART-A UNIT – 5
1 What is cross site scripting vulnerability? 2 2 CO5
2 What are the limitations of firewalls? 2 2 CO5
3 What is secure socket Layer? 2 2 CO5
4 What are different alert codes of TLS protocol? 2 2 CO5
5 How to manage the password? 2 2 CO5
6 Recall the web security considerations 2 2 CO5
7 Define firewall. 2 2 CO5
8 Define Virus. 2 2 CO5
9 What do you mean by Intruder? 2 2 CO5
10 Mention the fields of TLS record format. 2 2 CO5
PART-B Unit 5 CO5
1 Explain secure electronic transaction in detail. 10 2 CO5
2 Briefly discuss about various types of viruses. 5 2 CO5
3 Demonstrate various types of firewalls. 10 3 CO5
4 List and briefly define the parameters that define an 5 2 CO5
SSL session state?
5 What are different services provided by the SSL Record 10 2 CO5
Protocol? Explain.
6 Describe firewall design principles. 5 3 CO5
7 What is intrusion? Discuss intrusion detection system 5 3 CO5
with neat diagram.
8 Recall notes on virtual elections and secure inter-branch 10 3 CO5
payment transactions.
9 Discuss about Secure Socket Layer. 5 2 CO5
10 Explain different virus countermeasure techniques. 5 2 CO5

You might also like