100% found this document useful (1 vote)
4K views3 pages

Question Paper ccs354

The document is a question paper for a network security exam covering topics such as cryptography, key management, network access control, transport layer security, email security, mobile device security, password management, blockchain security, and firewalls and intrusion detection systems. It contains two parts with short questions and three parts with long answer questions.

Uploaded by

astronaut982003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views3 pages

Question Paper ccs354

The document is a question paper for a network security exam covering topics such as cryptography, key management, network access control, transport layer security, email security, mobile device security, password management, blockchain security, and firewalls and intrusion detection systems. It contains two parts with short questions and three parts with long answer questions.

Uploaded by

astronaut982003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Register No.

Affiliated to Anna University, Chennai & Approved by AICTE, New Delhi.


Eachanari, Coimbatore, Tamil Nadu, India-641021.

QUESTION PAPER CODE :

B.E/B.TECH DEGREE END SEMESTER EXAMINATIONS, NOVEMBER 2023


Fifth Semester
Information Technology
(Common to )
CCS354 - NETWORK SECUIRTY
(Regulations 2021)
Time: Three Hours Maximum: 100 Marks

Part A – Answer All (10 x 2 = 20 Marks)

1. Define conventional cryptography and public-key cryptography. [CO1,K1]


2. Explain the role of hash functions in cryptography. [CO1,K2]

3. What is the role of X.509 certificates in key management? [CO2,K1]

4. Describe the principles of remote user authentication using asymmetric [CO2,K2]


encryption.

5. Discuss the role of IP Security (IPsec) in ensuring network security. [CO3,K]

6. What is the significance of Transport Layer Security (TLS) in web security? [CO3,K1]

7. Explain the role of Pretty Good Privacy (PGP) in electronic mail security. [CO4,K1]

8. Briefly describe Mobile Device Security in the context of wireless network [CO4,K3]
security.

9. What is the role of Intrusion Detection Systems (IDS) in network security? [CO5,K1]

10 Discuss the characteristics and types of firewalls. [CO5,K2]


.
Part B – Answer All (5x13= 65 Marks)

11 A Explain the fundamental principles of conventional and public-key [CO1,K2 1


. cryptography. Discuss their applications and highlight the key differences 3
between them. ]

OR
B Describe the role of hash functions in cryptography. Provide examples of [CO1,K3 1
how hash functions contribute to data integrity and security. ] 3

12 A Evaluate the principles and components of Kerberos systems for remote user [CO2,K4 1
. authentication. Highlight their strengths and potential weaknesses in a ] 3
network security context.
OR
B Examine the role of X.509 certificates and Public-Key Infrastructure (PKI) in [CO2,K5 1
key management. Discuss the advantages and potential vulnerabilities of ] 3
PKI.
13 A Analyze the concept of Network Access Control (NAC) and its [CO3,K4 1
. implementation, including IEEE 802.1X Port-Based Network Access ] 3
Control. Discuss the benefits and challenges of NAC in securing networks.
OR
B Explain the principles of Transport-Level Security, focusing on Web [CO3,K3 1
Security Considerations, SSL, TLS, and the HTTPS standard. Discuss how ] 3
these protocols contribute to secure data transmission over the internet.

14 A Discuss the principles and applications of Electronic Mail Security, covering [CO4,K4 1
. Pretty Good Privacy (PGP), S/MIME, and DomainKeys Identified Mail ] 3
(DKIM). Evaluate their effectiveness in securing email communication.
OR
B Compare and contrast the security features of different mobile device [CO4,K5 1
operating systems. Discuss the best practices for securing mobile devices in a ] 3
corporate environment.
15 A Examine the significance of password management in enhancing overall [CO5,K3 1
. security. Discuss common password management practices and potential ] 3
vulnerabilities.
OR
B Discuss the security considerations and challenges associated with [CO5,K5 1
Blockchain, Cloud Security, and IoT Security. Analyze the measures and ] 3
best practices for securing data in these emerging technologies.
Part C – Answer All (1x15= 15 Marks)

16 A Elaborate on the concepts of authentication and digital signatures. Discuss [CO1,K4 1


. their significance in ensuring secure communication and transactions. ] 5

OR

B Evaluate the role of Firewalls and Intrusion Detection Systems (IDS) in [CO5,K4 1
network security. Discuss the characteristics, types, and configurations of ] 5
firewalls, along with the principles and challenges of intrusion detection.

You might also like