JAIN COLLEGE OF ENGINEERING, BELAGAVI
Department of Electronics & Communication Engineering
Academic Year: 2024-25
Sem (Div): VIII (A, B & C) Date: 10/11/2024
Sub: Network Security Sub Code: 18EC821
Assignment II
Bloom’s
Q. CO’
Questions Cognitive
No. s
Levels
Module-3
Draw the flow chart of processing for outbound packets and inbound
1. 3 L2
packets.
2. Explain the benefits of IPSec and routing applications.
3. What are the differences between Transport and Tunnel modes? 3 L2
Explain the IPSec Architecture.
4. 3 L2
What is the Security Association Database?
5.
6. Explain the ESP Packet Format. 3 L2
7. Write a short note on Internet key Exchange. 3 L2
Give examples of applications of IPSec with IP security scenario
8. 3 L2
diagram.
Module-4
Define and explain Intruder and Intrusion.
9. 4 L2
Explain the Intrusion detection and discuss the approaches to intrusion
10
detection.
11. Draw architecture for distributed intrusion detection and explain in detail. 4 L2
12. Explain the process of password guessing and password capturing. 4 L2
13. What are the different approaches to intrusion detection? Explain. 4 L2
14. What is firewall? Explain its limitations. 4 L2
Prepared By: Approved By:
Signature:
Name: Dr. Krupa Rasane Dr. Rajani H. P. RCP/HPR/KRR