0% found this document useful (0 votes)
48 views3 pages

Question Bank - CNS

This document contains a question bank with 112 questions divided across 6 units related to network security and cryptography. The questions cover topics such as symmetric and asymmetric encryption algorithms, message authentication codes, hash functions like SHA-512, digital signatures, key distribution techniques including X.509 certificates, Kerberos authentication protocol, SSL/TLS for secure web transactions, and IPSec protocols. Each question lists the chapter and page number in textbooks where the relevant topic is discussed to aid in looking up the answers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views3 pages

Question Bank - CNS

This document contains a question bank with 112 questions divided across 6 units related to network security and cryptography. The questions cover topics such as symmetric and asymmetric encryption algorithms, message authentication codes, hash functions like SHA-512, digital signatures, key distribution techniques including X.509 certificates, Kerberos authentication protocol, SSL/TLS for secure web transactions, and IPSec protocols. Each question lists the chapter and page number in textbooks where the relevant topic is discussed to aid in looking up the answers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Record No: ACAD/R/27

Pimpri Chinchwad Education Trust’s


Pimpri Chinchwad College of Engineering Revision: 00

Date: 18/08/2023

CNS Question Bank

Unit-IV Reference
(Refer William stallings 6th edition)

1 Apply Symmetric Encryption algorithm to achieve confidentiality and pg-384


authentication

2 Apply Asymmetric Encryption algorithm to achieve confidentiality, pg-384


authentication and digital signature.

3 Discuss requirements of Message Authentication pg-382

4 Explain the use of hash functions for message authentication pg-343

5 Explain SHA-512 algorithm.

6 Explain the working of a single round of SHA-512 algorithm.

7 Explain the derivation of words required for the 80 rounds of the SHA-
512 algorithm.

8 Explain HMAC algorithm in detail along with a neat diagram. PG-395

9 Explain Digital Signature Algorithm. pg-426

10 Explain ElGamal Digital Signature Scheme in detail. pg424

11 Problems on ElGamal Digital Signature Scheme. pg425


Unit-V
(Refer William stallings 6th edition)

1 Explain Symmetric key distribution using symmetric key encryption. pg442

2 Explain Symmetric key distribution using Asymmetric key encryption. pg451

3 Explain various methods to distribute public keys. pg454

4
Explain the X.509 scheme for the generation of public key certificates.

5 pg459
Draw the general format of X.509 certificate and explain.

6 What is Kerberos realm? pg461

7 Explain Kerberos version 4 pg482

8 From web
Find the difference between Kerberos version 4 and 5.

Unit-VI
From Atul Kahate 2nd Edition

1 Explain Static and Dynamic Web Pages. Pg 266

2 Explain the Secure Socket Layer(SSL) along with its working.(Write all pg272
four phases)

3 Explain Record Protocol. pg280

4 Explain Transport Layer Security. pg284

5 Differentiate between SSL and TLS pg284

6 Explain Secure Hypertext Transfer Protocol. Pg 284


7 Explain the Secure Electronic Transaction process. Pg 286

8 Compare Secure Socket Layer (SSL) versus Secure Electronic Pg 298


Transaction (SET).

9 Explain IPSec protocols. Pg 452

10 Explain Internet Key Exchange Protocol. Pg 458

11 Explain modes of IPSec working. Pg 463

12 Explain Encapsulating Security payload. Pg 464

You might also like