0% found this document useful (0 votes)
76 views6 pages

Q.1. Explain in Detail Different Security Mechanisms? Q.2. What Are Eight Security Mechanisms To Implement Security? Q.3

This document contains summaries of 6 chapters on computer network security and cryptography. It provides a list of important questions for each chapter, covering topics such as security mechanisms, symmetric and asymmetric cryptography, malware, IP security, network management security, and system security. The questions ask about specific algorithms, protocols, and security concepts, as well as differences between certain methods. It directs the reader to examples and other reference materials for problem-based questions.

Uploaded by

Muzammil Baloch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views6 pages

Q.1. Explain in Detail Different Security Mechanisms? Q.2. What Are Eight Security Mechanisms To Implement Security? Q.3

This document contains summaries of 6 chapters on computer network security and cryptography. It provides a list of important questions for each chapter, covering topics such as security mechanisms, symmetric and asymmetric cryptography, malware, IP security, network management security, and system security. The questions ask about specific algorithms, protocols, and security concepts, as well as differences between certain methods. It directs the reader to examples and other reference materials for problem-based questions.

Uploaded by

Muzammil Baloch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CHAPTER 1: Introduction to Computer Network Security & Cryptography

Important Questions

Q.1. Explain in detail different Security Mechanisms?


Q.2. What are eight security mechanisms to implement security?
Q.3. Explain various type of attack on computer system.
Q.4. Explain Passive and active security attacks?

Q.5.Difference between :Symmetric Cryptography and Asymmetric Key Cryptogaphy.


Q.6.Explain Substitution and Transposition Cipher methods?

Q.6.Difference between Poly-Alphabetic Cipher and Monoalphabetic Cipher.

Q.7.Write a Short note on Transposition techniques: Columnar and Keyless Transposition techiques.
Q.8.What is Stegnography ?

Q.9. Explain CIA Traids.

Q.10.Difference between Stegnography and Cryptogaphy.


NOTE : For Problem based questions : Refer solved example. (Notes) also refere open book test questions and
PPT.
CHAPTER 2: Cryptography Key management, distribution and user authentication

Important Questions

Q.1. Explain Block Cipher modes of Operation?


Q.2. Difference between AES and DES?
Q.3. Explain RSA algorithm.
Q.4. Difference between HMAC and CMAC?

Q.5.List and Explain different Hashing Techniques.


Q.6.Explain Kerberoes?

Q.6.Short note on : PKI,Digital Certificate X.509

Q.7.Write a Short note on : Digital Signature Schemes: RSA and DSS


NOTE : For Problem based questions (RSA and Diffie Hellman) : Refer solved example. (Notes) also refere open
book test questions and PPT.
CHAPTER 3: Malicious Software

Important Questions

Q.1. Define: SPAM, Trojan horse, Virus, Trapdoor?


Q.2. Difference between Phishing and Spoofing?
Q.3. Explain Denial of Service Attacks
Q.4. Diffference between Worm and Virus?

Q.5.Explain Zombie Attack.


Q.6. Write a short note on : Malicious Software
CHAPTER 4: IP Security, Transport level Security and Email Security

Important Questions

Q.1. Short note: IPSec Architecture.


Q.2. Explain Transport level Security?
Q.3. Explain AH and ESP in detail
Q.4.Explain Email Security ( S/MIME)

Q.5.Short note : VPN.


Q.6. Write a short note on : Malicious Software.

Q.7.Explain SSL (Secure Socket Layer Architecture ) in detail.


CHAPTER 5: Network Management Security and Network Access Control

Important Questions

Q.1. Short note : SNMPv3.


Q.2. Explain Principal elements of NAC?
Q.3. What are the advantages of NAC.
Q.4.Explain type of Network Access Control.

Q5. Explain SNMPv different version.


CHAPTER 6: System Security

Important Questions

Q.1.Explain Firewall and its type?


Q.2.Explain IDS and its type?
Q.3. Difference between Firewall and IDS.
Q.4.Explain characteristics of Firewall and IDS.

You might also like