0% found this document useful (0 votes)
41 views1 page

Wa0000.

Uploaded by

ranju18102002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views1 page

Wa0000.

Uploaded by

ranju18102002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

JAIN COLLEGE OF ENGINEERING, BELAGAVI

Department of Electronics & Communication Engineering


Academic Year: 2024-25
Sem (Div): VIII (A, B & C) Date: 10/11/2024
Sub: Network Security Sub Code: 18EC821
Assignment II
Bloom’s
Q. CO’
Questions Cognitive
No. s
Levels
Module-3
Draw the flow chart of processing for outbound packets and inbound
1. 3 L2
packets.
2. Explain the benefits of IPSec and routing applications.

3. What are the differences between Transport and Tunnel modes? 3 L2


Explain the IPSec Architecture.
4. 3 L2
What is the Security Association Database?
5.

6. Explain the ESP Packet Format. 3 L2

7. Write a short note on Internet key Exchange. 3 L2

Give examples of applications of IPSec with IP security scenario


8. 3 L2
diagram.
Module-4
Define and explain Intruder and Intrusion.
9. 4 L2

Explain the Intrusion detection and discuss the approaches to intrusion


10
detection.
11. Draw architecture for distributed intrusion detection and explain in detail. 4 L2
12. Explain the process of password guessing and password capturing. 4 L2
13. What are the different approaches to intrusion detection? Explain. 4 L2

14. What is firewall? Explain its limitations. 4 L2

Prepared By: Approved By:

Signature:

Name: Dr. Krupa Rasane Dr. Rajani H. P. RCP/HPR/KRR

You might also like