Network Security Question Bank
Network Security Question Bank
in JNTU World
ld
or
W
1. GROUP-A (SHORT ANSWER QUESTIONS)
TU
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
UNIT-I
1 Explain security attacks? Understand 1,2
2 Enumerate traffic analysis? Knowledge 1,2
3 Categorize active attacks? Apply 1,2
4 Categorize passive attacks? Apply 1,2
5 Mention the key principles of security? Compare 1,2
JN
ld
UNIT – III
1 Differentiate between private and public key? Apply 5
2 Enumerate uses of public key cryptography? Knowledge 5
3 Differentiate public key and conventional encryption? Knowledge 5
4 Explain the rules of public and private key? Understand 5
5 Explain the principles elements of a public key cryptography? Understand 5
or
6 Specify the application of public key cryptography? Compare 5
7 List four general characteristics of a scheme for distribution of
Knowledge 6
the public key?
8 Discuss about key management in public key cryptography? Understand 6
9 Discuss digital signatures? Understand 6
10 Explain about X.509 certificate? Understand 6
11
Kerberos v4?
W
Differentiate simple and secure authentication dialogue in
Apply 6
UNIT – IV
1 Define PGP? Knowledge 7
2 Explain why PGP is open source? Understand 7
3 List out notations used in PGP? Knowledge 7
4 List out services of PGP? Knowledge 7
TU
ld
7 State advantages of SET protocol? Knowledge 12
8 Explain dual signatures? Understand 12
9 Examine purpose of dual signatures? Knowledge 12
10 State SSL handshake protocol message types? Knowledge 12
UNIT – VII
or
1 Explain how sense network management architecture
Understand 13
considered integrated?
2 Explain key elements of the SNMP model? Understand 13
3 Explain usage of MIB? Understand 13
4 Examine auto-discovery in SNMP protocol? Knowledge 13
5 Summarize functions of a SNMP protocol? Understand 13
6
7
W
Prepare USM message parameters?
Identify elements that comprise VACM?
Apply
Knowledge
13
13
8 State classes of intruders? Knowledge 14
9 Collaborate different file access activities used for intrusion
Compare 14
detection?
10 Enumerate types of viruses? Knowledge 14
11 Examine how does a worm propagate? Knowledge 14
UNIT - VIII
TU
ld
detail the amount of information known to cryptanalytic?
3 Demonstrate model for internetwork security with neat
Understand 1,2
diagram?
4 Demonstrate how internet standards have been standardized by
Understand 1,2
using RFC?
5 Differentiate TCP and UDP session hijacking? Apply 1,2
6 Enumerate man in-middle attack in network? Knowledge 2
or
7 Discriminate how buffer overflow is categorized under
Examine 2
software weakness?
8 Demonstrate ARP attack in the network with an example? Understand 2
9 Enumerate the security goals and explain each with an
Knowledge 2
example?
10 Compare and contrast active and passive attacks? Understand 2
UNIT – II
1
W
Describe how Compile the process how RC4 decryption is
Compare 3
reverse of its encryption?
2 Justify how DES algorithm uses feistel cipher structure? Examine 3
3 Enumerate the principles of conventional encryption
Knowledge 3
algorithms?
4 Demonstrate how encryption is misused to attack the system? Understand 3
5 Recite round function evaluation in feistel cipher structure? Knowledge 3
TU
ld
private key, PGP uses three separate requirements what are Compare 7
those and explain why are they used?
4 Demonstrate the general format of PGP message with an
Understand 7
example?
5 Demonstrate the general structure of private key ring? Understand 7
6 Illustrate different approaches to public key management? Apply 7
or
7 Justify why S/MIME is a security enhancement to MIME
Examine 8
internet e-mail format standard?
8 Explain of MIME specification with an example? Understand 8
9 Demonstrate MIME transfer encoding techniques and
Understand 8
certificate processing?
10 Illustrate S/MIME message? Apply 8
UNIT - V
1
W
Discuss how IPESC encompasses three functional areas:
a) Authentication b) Confidentiality Understand 9
c) Key management
2 Discuss how HMAC message authentication code can be
Understand
applied to the entire original TP packet (tunnel mode)?
3 Discuss how HMAC message authentication code can be
Understand 9
applied to the entire original TP packet (transport mode)?
4 Examine how confidentiality is provided by an ESP? Knowledge 9
TU
ld
9 Demonstrate how SSL and TLS provide security on the web? Understand 11
10 Differentiate the process of security provided by SSL and
Apply 11,12
TLS?
UNIT - VII
1 Determine with description how SNMP provide proxy
Examine 13
configuration?
2 Analyze distributed network management configuration with an
or
Knowledge 13
example?
3 Compare and contrast SNMPv1 and SNMPv2 protocol data
Understand 13
unit?
4 Discuss the following
(a) SNMPv3 protocol architecture Understand 13
(b) SNMPv3 architecture
5 Draw a block diagram of traditional SNMP agent with
Apply 13
6
explanation?
W
Demonstrate process of command generator notification
Understand 13
generator with diagrams?
7 Justify intrusion into a computer system or network is one of
Compare 14
the most serious threats to security?
8 Enumerate intrusion techniques with description? Knowledge 14
9 Classify intruders with an explanation Apply 14
10 Give description of VACM and also explain elements of the
Compare 14
TU
VACM model?
UNIT - VIII
1 Demonstrate how does the intrusion detection system work
when the contents of the network message are encrypted? At Understand 15,16
what level can this packet be read and analyzed?
2 Describe how hackers exploit vulnerabilities in the network-
Knowledge 15,16
based computing systems?
3 Analyze various approaches to prevention and detection from
Apply 15,16
unauthorized users?
4 Examine software threats to systems with a special emphasis
JN
Knowledge 15,16
on viruses and worms?
5 Enumerate counter measure for viruses and worms? Knowledge 15,16
6 Discuss standard approach to the protection of local computer
Understand 15,16
assets from external threats?
7 Discuss firewall design principles and also explain techniques? Understand 15,16
8 Discuss how intrusion prevention is achieved through password
Understand 15,16
management?
9 Justify Intrusion provides early warning of an intrusion so that
Compare 15,16
defensive action can be taken to prevent or minimize damage?
10 Differentiate statistical anomaly detection and rule–based
Apply 15,16
intrusion detection?
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
UNIT-I
1 Demonstrate the network model? Understand 2
2 Draw matrix that shows the relationship between security
Knowledge 1
mechanisms and attacks?
ld
UNIT – II
1 Demonstrate RC4 key value will leave S unchanged during
initialization. That is , after the initial permutation of S, the
Understand 3
entries of S will be equal to the values from 0 through 255 in
ascending order?
2 Discuss the security implications of following centralization?
Key distribution schemes using an access control centre and/or
or
Knowledge 4
a key distribution centre have central points. vulnerable to
attack
3 Can RC4 be used in either CBC or EBC modes? Apply 3
4 RC4 has a secret internal state which is a permutation of all
possible values of the vector S and the two indices i and j
Apply 3
(a) Using a straightforward scheme to store the internal state,
how many bits are used?
W UNIT – III
1 Consider RSA cipher with n=383*563=215629 and e=49.The
plain text, n, is encrypted with c=E (m) =m49modulo n. Show
Understand 5
that for each encrypted text c, E10(c) =c holds. Find a simple
way for a cryptanalyst to find the plain text m from c?
2 Consider a Diffie-Hellman scheme with a common prime q=11
and a primitive root $=2
(a) If user A has a public key YA=9, What is A’s private key
TU
Knowledge 5
XA
(b) If user B has a public key YB=3, What is the shared secret
key k
3 Suppose we have a set of blocks encoded with RSA algorithm
and we don’t have the private key. Assume n-pq, e is the public
key. Suppose also someone tells us they know one of the plain Apply 5
text blocks has a common factor with n. Does this help us in
any way?
4 In public –key system using RSA, you intercept the cipher text
C=10 sent to a user whose public key e=5, n-35. What is the Apply 5
JN
plaintext M?
5 Demonstrate the shortcomings of Kerberos version 4 and how
Understand 6
Are they addressed in version 5?
6 Suppose that, in PCBC mode, blocks Ci and Ci+1 are
interchanged during transmission. Show that this affects only Knowledge 6
the decrypted blocks Pi and Pi+1 but not subsequent blocks?
UNIT – IV
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
1 PGP makes use of cipher feedback (CFB) mode of CAST-128,
whereas most symmetric encryption applications (other than
key encryption) use the cipher block chaining (CBC) mode. We
have
CBC: Ci = E(K, [Ci-1 ex-or Pi]);
Understand 7
Pi = Ci-1 ex-or D(K, Ci)
CFB: Ci = Pi ex-or E(K,Ci-1);
Pi = Ci ex-or E(K, Ci-1)
These two appear to provide equal security. Suggest a reason
ld
why PGP uses the CFB mode?
2 In the PGP scheme, what is the expected number of session
Knowledge 7
keys generated before a previously created key is produced?
3 Consider radix-64 conversion as a form of encryption. In this
case, there is no key. But suppose that an opponent knew only
that some form of substitution algorithm was being used to Apply 7
or
encrypt English text and did not guess it was R64. How
effective would this algorithm be against cryptanalysis?
4 Demonstrate different cryptographic algorithms used in
Apply 7,8
S/MIME. Explain how S/MIME is better than MIME?
UNIT – V
1 Explain the different payloads of ISAKMP for authentication
Understand 9
and non- repudiation?
2
W
The IPSEC architecture document states that when two
transport mode SA’s are bundled to allow both AH and ESP
protocols on the same end-to-end flow, only one ordering of
security protocols seems appropriate: performing the ESP Knowledge 9
protocol before performing the AH protocol. Why is this
approach recommended rather than authentication before
encryption?
3 When tunnel mode is used, a new outer IP header is
constructed. For both IPV4 and IPV 6, indicate the relationship
TU
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
2 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) Brute-Force Cryptanalytic Attack: An exhaustive search Knowledge 11
of the key space for a conventional encryption algorithm
(b) Reply attack: Earlier SSL handshake message are replayed
3 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) Man-in-Middle Attack: An attacker interposes during key
exchange, acting as the client to the server and as the Apply 11
ld
server to the client
(b) IP Spoofing: Uses forged IP addresses to fool a host into
accepting bogus data
4 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) IP Hijacking: An active, authenticated connection between
or
two hosts is disrupted and the attacker takes the place of
one of the hosts
(b) SYN Flooding: An attacker sends TCP SYN message to Knowledge 11
request a connection but does not respond to the final
message to establish the connection fully. The attacked
TCP module typically leaves the “half=open connection”
around for a few minutes. Repeated SYN messages can
clog the TCP module
W UNIT - VII
1 Why does SNMP use unreliable UDP datagram? What would
be the reason for the designer to choose UDP instead of TCP for Understand 13
the transport protocol for SNMP?
2 In SNMPv1, any object in an MIB is defined as having an MIB
Access Category, which can be assigned one of the following
values: read-only, read-write, write-only, and not-accessible. A
read is accomplished with a get or trap operation, and a write is
TU
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
1 The question arises as to whether it is possible to develop a
program that can analyze a piece of software to determine if it is
a virus.
Program CV :=
{ ……
main-program :=
{ if D(CV) then goto next:
Else infect-executable; Understand 16
}
ld
next:
}
In the proceeding program, infect-executable is a module that
scans memory for executable programs and replicates itself in
those programs. Determine if D can correctly decide whether
CV is a virus?
or
2 How does the behaviour-blocking software monitor the
Knowledge 15
program behaviour in real-time systems?
3 The necessity of the “no read up” rule for a multilevel secure
system is fairly obvious. What is the importance of the “no Apply
write down” rule?
4 Describe how firewall can be used to protect the network
against the following attacks.
(a) SMTP Server Hijacking( Unauthorized Relaying)
W
(b) Exploiting Bugs in Applications
(c) Bugs in Operating Systems
Apply 15,16
(d) ICMP Flooding
(e) Ping of Death
(f) Sub-seven Trojan
TU
JN