CNS Question Bank
CNS Question Bank
NO OF
UNIT PROPOSED DELIVERY
S.No TOPICS TO BE COVERED CLASSES
NO DATE REFERENCE METHOD ACTUAL DATE REMRKS
REQUIRED
Module-1
Security Concepts
1 I 31-07-2023 Introduction 1 T1,R1 C&T
17
15 II 24-9-2023 Block Cipher principles 1 T1,R1 C&T
23 II 6-9-2023
RC4 1 T1,R1 C&T
30
III Message Authentication T1,R1
PPT
20-9-2023
18
37 III 13-10-2023 CMAC 1 T1,R1 C&T
38 III 16-10-2023
Digital signatures T1,R1 C&T
39 III
16-10-2023
Digital signatures 2 T1,R1 C&T
19
56 IV 20-11-23 IEEE802.11i Wireless 1 T1,R1 C&T
LAN Security
Module-V E-mail Security
20
LESSON PLAN: IV CSE C
NO OF
UNIT PROPOSED DELIVERY
S.No TOPICS TO BE COVERED CLASSES
NO DATE REFERENCE METHOD ACTUAL DATE REMRKS
REQUIRED
Module-1
Security Concepts
1 I 31-07-2023 Introduction 1 T1,R1 C&T
21
18 II 26-08-2023 .1 T1,R1 C&T
Blowfish
19 II 28-08-2023 RC5 1 T1,R1 C&T
2
III 18-09-2023 Message Authentication PPT
30 T1,R1
22
39 III 12-10-2023 Digital signatures T1,R1 C&T
23
58 V 20-11-2023 S/MIME 1 T1,R1 C&T
24
8.Unit wise Question Bank
UNIT-I
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define cryptanalysis and cryptology. L1 CO1 PO1,PO6
2 What is masquerade? L1 CO1 PO1,PO6
3 Define passive attack and active attack. L1 CO1 PO1,PO6
4 Define Denial of service. L1 CO1 PO1,PO6
5 What is steganography? Mention few techniques in it. L1 CO1 PO1,PO6
6 Mention few mono-alphabetic and poly-alphabetic ciphers. L1 CO1 PO1,PO6
7 Define Threat and attack. List out what are the attacks that canbe L1 CO1 PO1,PO6
performed in network.
8 Convert the Given Text “CRYPTOGRAPHY” into cipher text L3 CO1 PO1,PO6
using Rail fence Technique.
9 Define security attack, security mechanism and security services. L1 CO1 PO1,PO6
10 Define the two basic building blocks of encryption techniques L1 CO1 PO1,PO6
Part– B(Long Answer Questions)
11 a) Explain in detail about OSI security architecture. L2 CO1 PO1,PO6
b) Explain classical encryption techniques (Steps involved in each L2 CO1 PO1,PO6
encryption technique like Caesar cipher, playfair cipher, hill
cipher, vigenere cipher, one time pad cipher, rail fence, etc)
12 a) Explain about steganography, transposition cipher. L2 CO1 PO1,PO6
b) Write short notes on security mechanisms L6 CO1 PO1,PO6
13 a) Explain about substitution ciphers in detail with an example. L2 CO1 PO1,PO6
b) What are the goals of security? Explain in detail about security L1 CO1 PO1,PO6
Services?
14 a) what is meant by security attack? Explain various types of L1 CO1 PO1,PO6
security attacks.
b) UNIT–
Draw a matrix that shows the relationship between security L2 CO1 PO1,PO6
mechanisms and attacks. II
15 a) Symmetric keyciphers
Explain various transposition cipher, with
Assysmmetric cipher
an example L2 CO1 PO1,PO6
25
UNIT_II
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define symmetric key cryptography and public key cryptography. L1 CO2 PO3
2 Define Euler’s totient function (used in RSA algorithm). L1 CO2 PO3
3 Why do we need Diffie Hellman algorithm? L2 CO2 PO3
4 Mention the various types of cryptanalytic attack. L1 CO2 PO3
5 What are the operations used in AES? L1 CO2 PO3
6 What are the various approaches to attacks the RSA algorithm? L1 CO2 PO3
7 How to find primitive root with an example. L3 CO2 PO3
8 What primitive operations are used in RC4 L1 CO2 PO3
9 Compare stream cipher with block cipher with example L3 CO2 PO3
10 Define Euler’s theorem and its application. L1 CO2 PO3
Part– B(Long Answer Questions)
11 a) Discuss various steps of IDEA algorithm. L3 CO2 PO3
b) Explain UNIT–
Diffie-Hellman
III key exchange algorithm in detail. L2 CO2 PO3
Cryptographic hash functions
a)
Explain the steps involved in knapsack algorithm with an L2 CO2 PO3
12 example.
b) Explain in detail about the steps involved in DES. L2 CO2 PO3
13 a) Explain Elgamal algorithm in detail. L2 CO2 PO3
UNIT-III
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 What is meant by Message Authentication? L1 CO3 PO2,PO3
2 List out the attack on MAC L1 CO3 PO2,PO3
3 Define Digital signature L1 CO3 PO2,PO3
4 What you meant by MAC L1 CO3 PO2,PO3
5 Differentiate Message Authentication Code and Hash function. L4 CO3 PO2,PO3
6 What are the two approaches of Digital Signature? L1 CO3 PO2,PO3
7 Define Hash function . L1 CO3 PO2,PO3
8 List out the different techniques of distributing the public key L1 CO3 PO2,PO3
26
9Define one way property, weak collision resistance and strong L1 CO3 PO2,PO3
collision resistance of hash function.
10 Define the classes of message authentication function. L1 CO3 PO2,PO3
Part– B(Long Answer Questions)
11 a) With the example, explain in detail about Secure Hash Algorithm L2 CO3 PO2,PO3
b) Explain in detail about HMAC and Digital Signature Standard L2 CO3 PO2,PO3
12 a) Give a brief note on basic uses of message authentication code. L3 CO3 PO2,PO3
b) Explain the process involved in message digest generation and L2 CO3 PO2,PO3
processing of single block in SHA512.
13 a) What is the purpose of digital signature? Explain its properties L1 CO3 PO2,PO3
and requirements.
b) Explain the requirements of digital signatures and also discuss L2 CO3 PO2,PO3
how problems related to digital signature are taken care by an
arbiter?
14 a) State and explain the different approaches to message L3 CO3 PO2,PO3
authentication
b) Explain the format of X.509v3 certificate and certificate L2 CO3 PO2,PO3
revocation list. Explain each in detail.
15 a) Explain about characteristics of hash functions L2 CO3 PO2,PO3
b) Explain briefly about Kerberos and give its requirements. L2 CO3 PO2,PO3
16 a) Explain in detail about Elgamal Digital signature scheme. L2 L2 PO2,PO3
b) Verify the signature with the Elgamal Digital signature of values L3 L5 PO2,PO3
q=19,α=10,XA=16,m=14,k=5.
UNIT-IV
S.No Questions BT CO PO
Part –A(Short Answer Questions)
1 Define transport and tunnel mode. L1 CO4 PO1,PO3
2 What are the benefits of mobile device security. L1 CO4 PO1,PO3
3 Mention the phases of the Handshake protocol. L1 CO4 PO1,PO3
4 Why do we need an anti replay service? L2 CO4 PO1,PO3
5 What is the use of the change cipher spec protocol? L1 CO4 PO1,PO3
6 What are the two characteristic of wired LAN that are not L1 CO4 PO1,PO3
inherent in wireless
7 What is the need pf padding in Encapsulating Security Payload L1 CO4 PO1,PO3
(ESP)?
8 What is security association? L1 CO4 PO1,PO3
9 Define the terms: connection and session. L1 CO4 PO1,PO3
10 How the security associations be combined? L3 CO4 PO1,PO3
Part– B(Long Answer Questions)
11 a) Briefly explain about transport layer security and Padding. L2 CO4 PO1,PO3
b) With a neat diagram, explain the operation of SSL and SSH L2 CO4 PO1,PO3
Record Protocol.
12 a) Differentiate SSL & TLS L4 CO4 PO1,PO3
b) Write a short notes on IEEE 802.11 i services. L6 CO4 PO1,PO3
13 a) Write a short notes on IEEE 802.11 i Phases of operation. L6 CO4 PO1,PO3
b) Explain in detail, the Handshake protocol in secure socket layer L2 CO4 PO1,PO3
27
14 a) Write a short note on Wireless LAN Security. L6 CO4 PO1,PO3
b) Write a short note on HTTPS. L6 CO4 PO1,PO3
15 a) What are the different types of mobile device security. Explain L1 CO4 PO1,PO3
each.
b) How does mobile device security work? L3 CO4 PO1,PO3
16 a) Explain in detail about SSL L2 CO4 PO1,PO3
b) What is the importance of providing Security for wireless LAN L1 CO4 PO1,PO3
UNIT-
V
Email security
S.No Questions BT CO PO
Part –A(Short Answer Questions)
Mention the services provided by the Pretty Good Privacy (PGP). L1 CO5 PO5,PO6
,PO7
2 What are the notations of PGP? L1 CO5 PO5,PO6
,PO7
3 What do you mean by IKE. L1 CO5 PO5,PO6
,PO7
4 Classify the intruders. L3 CO5 PO5,PO6
,PO7
5 How E-mail compatibility is performed? L3 CO5 PO5,PO6
,PO7
6 How the password files be protected? L3 CO5 PO5,PO6
,PO7
7 List out the limitations of secure multiparty computation. L1 CO5 PO5,PO6
,PO7
8 Mention the benefits of IPSec. L1 CO5 PO5,PO6
,PO7
9 Define cross site scripting vulnerability. L1 CO5 PO5,PO6
,PO7
10 Define different types of voting systems in virtual elections. L1 CO5 PO5,PO6
,PO7
Part– B(Long Answer Questions)
11 a) Name the protocols that provide security in IPSec. L2 CO5 PO5,PO6
,PO7
b) Write short notes on PGP. L6 CO5 PO5,PO6
,PO7
12 a) Explain in detail about IP Security Policy L2 CO5 PO5,PO6
,PO7
b) Explain how S/MIME differs form MIME L2 CO5 PO5,PO6
,PO7
13 a) What are the design goals for a firewall? Also mention its L1 CO5 PO5,PO6
Limitations ,PO7
b) List the five important features of IKE key determination L1 CO5 PO5,PO6
algorithm ,PO7
14 a) Write a short note on cross site scripting vulnerability. L6 CO5 PO5,PO6
,PO7
28
b) Explain secure inter branch payment transactions. L2 CO5 PO5,PO6
,PO7
15 a) Explain the secure multiparty calculation.. L2 CO5 PO5,PO6
,PO7
b) Write a short note on Single sign on. L6 CO5 PO5,PO6
,PO7
16 a) What are the features of IKE Key algorithm. L1 CO5 PO5,PO6
,PO7
b) Explain the voting systems in virtual elections. L2 CO5 PO5,PO6
,PO7
29
9. PREVIOUS END EXAM QUESTION PAPERS
30