0% found this document useful (0 votes)
28 views2 pages

CCS354 NS

Uploaded by

sdssumi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

CCS354 NS

Uploaded by

sdssumi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

REG.

NO:
REG.NO:
CHRISTIAN COLLEGE OF ENGINEERING & TECHNOLOGY
CHRISTIAN COLLEGE OF ENGINEERING & TECHNOLOGY ODDANCHATRAM – 624619
ODDANCHATRAM – 624619
DEPARTMENT OF CSE AND IT
DEPARTMENT OF CSE AND IT MODEL EXAM – APR – MAY-2024
MODEL EXAM – APR – MAY-2024 Subject Code & Name : CCS354 NETWORK SECURITY
Year/Sem : III / 06 Duration: 3 HRS
Subject Code & Name : CCS354 NETWORK SECURITY Date : 24.04.2023(AN) Max. Marks: 100
Year/Sem : III / 06 Duration: 3 HRS
Date : 24.04.2023(AN) Max. Marks: 100 PART – A (10X2=20 Marks)
1. Differentiate: Passive attack and Active attack (CO1,L4)
PART – A (10X2=20 Marks) 2. What is threat? List their types. (CO1,L1)
1. Differentiate: Passive attack and Active attack (CO1,L4) 3. Show how SHA is more secure than MD5 (CO2,L1)
2. What is threat? List their types. (CO1,L1) 4. What is the life cycle of a key? (CO2,L5)
3. Show how SHA is more secure than MD5 (CO2,L1) 5. Compare: AH and ESP (CO3,L5)
4. What is the life cycle of a key? (CO2,L5) 6. Give the definition of Tunnel mode and Transport mode? (CO3,L5)
5. Compare: AH and ESP (CO3,L5) 7. What is MIME? (CO4,L1)
6. Give the definition of Tunnel mode and Transport mode? (CO3,L5) 8. What do you mean by PGP? (CO4,L2)
7. What is MIME? (CO4,L1) 9. Who is masquerader and who is clandestine user? (CO5,L3)
8. What do you mean by PGP? (CO4,L2) 10. Define the roles of firewalls. (CO5,L4)
9. Who is masquerader and who is clandestine user? (CO5,L3)
10. Define the roles of firewalls. (CO5,L4) PART – B (13X5 = 65 Marks)
11. a) How hash function algorithm is designed? Explain their functions
PART – B (13X5 = 65 Marks) and properties. (13) (CO1, L4)
11. a) How hash function algorithm is designed? Explain their functions (OR)
and properties. (13) (CO1, L4) b) What is digital signature? Explain the key generation,signing
(OR) and signature verification algorithm.Bring out the steps followed
b) What is digital signature? Explain the key generation,signing to create a digital signature. (13) (CO1, L3)
and signature verification algorithm.Bring out the steps followed 12. a) Explain about the remote user authentication
to create a digital signature. (13) (CO1, L3) principles.(13) (CO2,L2)
12. a) Explain about the remote user authentication (OR)
principles.(13) (CO2,L2) b) Elaboraetly explain Kerberoes authentication mechanism
(OR) with suitable diagrams. (13m) (CO2, L2)
b) Elaboraetly explain Kerberoes authentication mechanism 13. a) Define: Network Access Control (NAC) and briefly explain about
with suitable diagrams. (13m) (CO2, L2) IEEE 802.1X Port –based network access control. (13m) (CO3, L5)
13. a) Define: Network Access Control (NAC) and briefly explain about (OR)
IEEE 802.1X Port –based network access control. (13m) (CO3, L5) b) Explain in detail about TLS.(13) (CO3, L2)
(OR) 14) a) Explain in details about PGP.(13) (CO4, L2)
b) Explain in detail about TLS.(13) (CO3, L2) (OR)
14) a) Explain in details about PGP.(13) (CO4, L2) b) Explain about DKIM key management and Verification. (13) (CO4, L2)
(OR) 15. a) Describe the working of Intrusion Detection Password Management
b) Explain about DKIM key management and Verification. (13) (CO4, L2) systems.(13). (CO5, L4)
15. a) Describe the working of Intrusion Detection Password Management
systems.(13). (CO5, L4)
b) Explain the various types of firewall in detail?(13) (CO5, L2) b) Explain the various types of firewall in detail?(13) (CO5, L2)

PART C (1× 15= 15Marks) PART C (1× 15= 15Marks)

16. a. Explain in details about Remote User-Authentication principles (15) 16. a. Explain in details about Remote User-Authentication principles (15)
(CO2, L4) (CO2, L4)
(OR) (OR)
b. Explain the various types of conventional encryption techniques.(15) b. Explain the various types of of conventional encryption techniques.(15)
(CO1, L4) (CO1, L4)

SUB IN-CHARGE IQAC HOD/IT SUB IN-CHARGE IQAC HOD/IT

You might also like