Network Security Question Bank
Network Security Question Bank
QUESTION BANK
SUBJECT
CCS354 – NETWORK SECURITY CLASS III YEAR–6th SEM CSE
CODE&TITLE
COURSE IN- 2023-2024
Mr B.SUKKRIVAN AY
CHARGE (EVEN SEM)
Vision:
To provide world class quality engineers, who will be intellectually strong, professionally
committed, ethically balanced, spiritually inspired and service minded, contributing to the
economical and technological demands of the nation, with special care on the rural society.
Mission:
To afford technical education to all sectors of people in particular to the rural society.
To inculcate technical skills and soft skills among students, with a tinge of spirituality.
To empower the students as responsible citizens, by nurturing good character in them,
besides imparting sound professional skills.
Course Outcomes:
CO1 Classify the encryption techniques
CO2 Illustrate the key management technique and authentication
CO3 Evaluate the security techniques applied to network and transport layer
CO4 Discuss the application layer security standards.
CO5 Apply security practices for real time applications.
Blooms Taxonomy:
REMEMBERING UNDERSTANDING APPLYING ANALYSING EVALUATE CREATE
R U A AN E C
UNIT – I - INTRODUCTION
Q. No. Questions BT CO
PART–A
PART- B & C
1 What is message digest? Explain its importance U CO1
Q. No. Questions BT CO
PART–A
What is public key? A
1 CO2
What is public key certificate? A CO2
2
What is symmetric key? A CO2
3
Define password protection. R CO2
4
What is Kerberos? E CO2
5
Show how SHA is more secure than MD5? A CO2
6
What are the certificates revoked in X.509? A CO2
7
What is key distribution center? A CO2
8
What are the advantages of key distribution? A CO2
9
What is key management? A CO2
10
Define session key. CO2
11 R
What is PKI? A CO2
12
What is key distribution? A CO2
13
What is digital certificate? A CO2
14
What is certification authority? A CO2
15
Define Realm. R CO2
16
PART- B & C
CO2
Q. No. Questions BT CO
PART–A
A
1 What is SSH? CO3
What is SSL session? A CO3
2
Which of the two services provided by SSL record protocol ? AN CO3
3
What is the purpose of HTTP? A CO3
4
A CO3
13 What is AH?
AN CO3
14 Differentiate transport mode and tunnel mode in IPSecurity.
CO3
15 R
List the application of IPSec
A CO3
16 What is IKE?
PART- B & C
Discuss the working of IPSec and what are the benefits of
1 U CO3
IPSec.
Describe IPSec protocol with its components and security CO3
2 services. R
Describe IEEE 802.1X port-based network access control. CO3
3 U
Describe IPSec architecture. CO3
4 A
CO3
5 Discuss application of IPSec and benefits of IPSec. U
CO3
6 AN
Briefly explain transport layer security.
CO3
7 Explain in detail about SSL. R
CO3
8 Describe Secure Shell and Its applications. R
Q. No. Questions BT CO
PART–A
Why does PGP generate the signature before applying A
1 compression? CO4
A CO4
2 What is MIME?
A CO4
3 What is S/MIME?
R CO4
16 What is device security in wireless network security?
R CO4
17 What is rapid security?
PART- B & C
U CO4
1 Briefly Explain Electronic mail security.
2 CO4
How PGP achieve authentication and confidential Explain?
C
Explain the PGP message format in detail. U
CO4
3
Q. No. Questions BT CO
PART–A
2 CO5
What is intrusion detection system? A
What are the design goal of firewall? CO5
3 A
List the limitations of firewall. CO5
4 R
5 CO5
What is virtual private network? A
6 CO5
Who is masquerader and who is clandestine use? R
CO5
7 What are the three main components involved in the U
distribution intrusion detection system?
AN CO5
8 Define Intruder.
R CO5
9 Name three different classes of Intruders.
C CO5
10 Define Intrusion.
U CO5
11 What are the advantages of intrusion detection system over
firewall?
R CO5
12 Define the role of firewall.
13 CO5
List various types of firewall. R
14 CO5
List the various password selection strategies. R
A CO5
15 What are the benefits of intrusion detection techniques?
PART- B & C
U CO5
3 Describe the Intrusion prevention system in detail.
U CO5
4 Explain statistical anomaly detection and rule based intrusion
detection.
Illustrate the common types of firewalls with diagrams. CO5
5
R
Describe the firewall configuration. CO5
6 U
Discuss how firewall help in the establishing the security CO5
7 U
frame work for an organization?
8 U CO5
Describe block chain technology.
U CO5
9 Describe cloud security and IOT security.