Question Paper ccs354
Question Paper ccs354
6. What is the significance of Transport Layer Security (TLS) in web security? [CO3,K1]
7. Explain the role of Pretty Good Privacy (PGP) in electronic mail security. [CO4,K1]
8. Briefly describe Mobile Device Security in the context of wireless network [CO4,K3]
security.
9. What is the role of Intrusion Detection Systems (IDS) in network security? [CO5,K1]
OR
B Describe the role of hash functions in cryptography. Provide examples of [CO1,K3 1
how hash functions contribute to data integrity and security. ] 3
12 A Evaluate the principles and components of Kerberos systems for remote user [CO2,K4 1
. authentication. Highlight their strengths and potential weaknesses in a ] 3
network security context.
OR
B Examine the role of X.509 certificates and Public-Key Infrastructure (PKI) in [CO2,K5 1
key management. Discuss the advantages and potential vulnerabilities of ] 3
PKI.
13 A Analyze the concept of Network Access Control (NAC) and its [CO3,K4 1
. implementation, including IEEE 802.1X Port-Based Network Access ] 3
Control. Discuss the benefits and challenges of NAC in securing networks.
OR
B Explain the principles of Transport-Level Security, focusing on Web [CO3,K3 1
Security Considerations, SSL, TLS, and the HTTPS standard. Discuss how ] 3
these protocols contribute to secure data transmission over the internet.
14 A Discuss the principles and applications of Electronic Mail Security, covering [CO4,K4 1
. Pretty Good Privacy (PGP), S/MIME, and DomainKeys Identified Mail ] 3
(DKIM). Evaluate their effectiveness in securing email communication.
OR
B Compare and contrast the security features of different mobile device [CO4,K5 1
operating systems. Discuss the best practices for securing mobile devices in a ] 3
corporate environment.
15 A Examine the significance of password management in enhancing overall [CO5,K3 1
. security. Discuss common password management practices and potential ] 3
vulnerabilities.
OR
B Discuss the security considerations and challenges associated with [CO5,K5 1
Blockchain, Cloud Security, and IoT Security. Analyze the measures and ] 3
best practices for securing data in these emerging technologies.
Part C – Answer All (1x15= 15 Marks)
OR
B Evaluate the role of Firewalls and Intrusion Detection Systems (IDS) in [CO5,K4 1
network security. Discuss the characteristics, types, and configurations of ] 5
firewalls, along with the principles and challenges of intrusion detection.