0% found this document useful (0 votes)
18 views5 pages

Question Bank - SR20

required paper

Uploaded by

praminna395
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Question Bank - SR20

required paper

Uploaded by

praminna395
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SR 20

Dept. : CSE
St. Peter’s Engineering College (Autonomous)
Dullapally (P), Medchal, Hyderabad – 500100. Academic Year
QUESTION BANK 2024-25
Subject : COMPUTER AND NETWORK SECURITY
Subject Code : AS20-05PC20
Class/Section : B. Tech. Year : IV Semester : I

BLOOMS LEVEL
Remember L1 Understand L2 Apply L3
Analyze L4 Evaluate L5 Create L6

*****
Q. No Question (s) Marks BL CO
UNIT - I
1 a)What is the need for Network Security? 2M L1 C411.1
b)Differentiate between Interruption and Interception? 2M L2 C411.1
c)What is integrity of data in network security? 2M L1 C411.1
d)Discuss about Masquerade attack in brief. 2M L2 C411.1
e)Define Steganography.? 2M L2 C411.1
2 a) What are the security mechanisms? 3M L2 C411.1
b) Explain Encryption with example and list out the substitution 3M
L2 C411.1
techniques of Cryptography. ?
c)What are active attacks? 3M L2 C411.1
d)Discuss CIA and AAA triad? 3M L1 C411.1
e)What is Cryptography? Explain with example? 3M L1 C411.1
3 a) Describe pervasive and specific security mechanisms in detail. 5M L2 C411.1
b) Explain Plain text, cipher text, Encryption and Decryption 5M
L3 C411.1
process.
c)Explain the different kinds of security approaches in network 5M
L2 C411.1
security.
d)Discuss about Brute force attack in detail. 5M L2 C411.1
e) List and briefly define categories of Security Services and 5M
L2 C411.1
attacks.
4 a)Describe the model for network security with neat sketch. 10M L3 C411.1
b) Discuss any transposition cipher with examples. 10M L2 C411.1
c)Discuss any transposition cipher with examples. 10M L2 C411.1
SR 20

Q. No Question (s) Marks BL CO


UNIT - II
1 a)List out the advantages of RC4 algorithm. 2M L1 C411.2
b)Name some important symmetric key algorithms. 2M L1 C411.2
c) Define a Feistel structure and name some Encryption algorithms
2M L1 C411.2
based on the Feistel structure.
d)Write about cipher block chaining mode of operation. 2M L2 C411.2
e)What is a stream cipher and block ciphers. 2M L1 C411.2
a)Do you agree with the statement that an increase in key size of 1
2 3M L4 C411.2
bit doubles the security of DES? Justify your answer.
b) Suppose that two parties A and B wish to set up a common 3M
secret key (D-H key) between themselves using the Diffie Hellman
key exchange technique. They agree on 7 as the modulus and 3 as
L4 C411.2
the primitive root. Party A chooses 2 and party B chooses 5 as their
respective secrets.
Compute the public keys of USER A.
c)List the round operations of AES Algorithm. 3M L1 C411.2
d)List the principles of Block ciphers. 3M L1 C411.2
e)What is IDEA? 3M L2 C411.2
3 a) Explain DES Algorithm and its advantages. 5M L2 C411.2
b) Distinguish between stream and block ciphers. 5M L2 C411.2
c) What is Eular Totient in RSA computation and write the steps 5M
L3 C411.2
for RSA algorithm.
d) Explain principles of public key cryptosystems. 5M L2 C411.2
e)Differentiate between RC 5 and blowfish. 5M L4 C411.2
a) AES consists of four functions in three layers. Which of the 10M
functions are primarily for confusion and which are primarily for
4 diffusion? Which of the layers are for confusion and which are for L2 C411.2
diffusion?
Justify your answers.
b) Enumerate Diffie-Hellman Key exchange for encryption and 10M
L3 C411.2
decryption with suitable examples.
c) Summarize the public key cryptographic principles. Explain 10M
RSA algorithm for given example, where L3 C411.2
p = 3 and q = 11.
SR 20

Q. No Question (s) Marks BL CO


UNIT - III
a) What is the length of the message digest and block size for
1 2M L1 C411.3
SHA-1, SHA-256,SHA-512, SHA-384.
b) What is salt and pepper in hashing? 2M L1 C411.3
c) Give a note on public key infrastructure. 2M L2 C411.3
d)What are the benefits of Digital Signature? 2M L2 C411.3
e)What is the message block size and Message Digest size in SHA
2M L1 C411.3
512 algorithm?
2 a) Write short note on message authentication. 3M L2 C411.3
b) What problem was Kerberos designed to address? Explain 3M L2 C411.3
c) What are message authentication codes? 3M L1 C411.3
d)Explain padding in SHA-512. 3M L2 C411.3
e)Compare SHA-1 and SHA-512. 3M L4 C411.3
a)What is HMAC function? Summarize the design objectives of
3 5M L4 C411.3
HMAC.
b) Explain about Elgamal Digital Signature Scheme 5M L1 C411.3
c) Explain the authentication requirement in message 5M
L2 C411.3
authentication codes.
d) Explain Distribution of public keys in key management and 5M
L2 C411.3
Distribution.
e)Discuss about the message exchange mechanism in Kerberos . 5M L2 C411.3
a)Explain Message Authentication Requirements and what are the 10M
4 L2 C411.3
attacks related to message
b)List the main features and procedure of SHA-512 cryptographic 10M
L4 C411.3
hash function.
c)Explain the concept of Keberos in key management and 10M
L2 C411.3
distribution.
SR 20

Q. No Question (s) Marks BL CO


UNIT - IV
a)In SSL and TLS, why is there a separate change cipher spec
1 protocol, rather than including change cipher spec message in the 2M L2 C411.4
handshake protocol?
b)Differentiate HTTP and HTTPS. 2M L2 C411.4
c)Differentiate public IP and Private IP addresses and which class
2M L3 C411.4
of IP addresses is mostly used for WLAN.
d)What is Secure socket Layer? 2M L2 C411.4
e)Discuss about the importance of security in mobile devices. 2M L2 C411.4
2 a)What is an access point and modes of wifi? 3M L2 C411.4
b)Enumerate the functionalities of Secure Shell. 3M L2 C411.4
c) What are the web security considerations? 3M L1 C411.4
d) Explain wireless security. 3M L2 C411.4
e)Write short note on transport layer security. 3M L2 C411.4
a)Explain “To DS and From DS” fields in IEEE 802.11 frame
3 5M L2 C411.4
format.
b)Write short note on key management and distribution in network 5M
L2 C411.4
security.
c)What is SSL? Explain about SSL Handshake Process. 5M L2 C411.4
d)Explain distribution of public keys. 5M L2 C411.4
e)Explain SSH protocol. 5M L2 C411.4
4 a)Explain in detail IEEE 802.11 MAC frame Format. 10M L2 C411.4
b)Explain in detail the mobile device security. 10M L2 C411.4
c) Explain Transport Level security in detail. 10M L3 C411.4
SR 20

Q. No Question (s) Marks BL CO


UNIT - V
1 a)What is PGP? 2M L1 C411.5
b)What are the applications of IPSec? 2M L1 C411.5
c)What are the advantages of Authentication Header Protocol? 2M L2 C411.5
d)What is single sign on? 2M L1 C411.5

e)Differentiate SMTP and MIME. 2M L1 C411.5

2 a)What is internet key exchange? 3M L2 C411.5


b) Give a brief note on Virtual Elections. 3M L2 C411.5
c)What is transport mode and tunnel mode in IP sec? 3M L2 C411.5
d)What is the concept of encapsulation in email security? 3M L1 C411.5
e)Explain Authentication Header. 3M L2 C411.5
3 a) Explain secure multiparty calculation. 5M L2 C411.5
b)Briefly explain the scenario of IP security and its Policy. 5M L2 C411.5
c)Explain Authentication Header. 5M L2 C411.5
d)Explain MIME. 5M L2 C411.5
e)Explain IP security architecture and also explain basic 5M
L2 C411.5
combinations of security associations with a neat diagram.
a)Write general format of PGP message with a pictorial 10M
4 L2 C411.5
representation and explain How PGP used for E-mail security?.
b) Write case study on Single sign On. 10M L3 C411.5
c)Explain IP security architecture. 10M L3 C411.5

You might also like