0% found this document useful (0 votes)
9 views1 page

Unit 2 Nis QB

The document is a question bank for a 2nd class test on Network & Information Security, covering topics such as Cryptography, Firewalls, Intrusion Detection Systems, and Cyber Laws. It includes specific questions related to digital signatures, DES algorithm, firewall configurations, types of firewalls, cyber crimes, and security protocols. Each question is assigned a mark value indicating its weight in the test.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

Unit 2 Nis QB

The document is a question bank for a 2nd class test on Network & Information Security, covering topics such as Cryptography, Firewalls, Intrusion Detection Systems, and Cyber Laws. It includes specific questions related to digital signatures, DES algorithm, firewall configurations, types of firewalls, cyber crimes, and security protocols. Each question is assigned a mark value indicating its weight in the test.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

2nd Class Test Question Bank

Subject :- Network & Information Security ( NIS ) Subject Code : 22620

Chapter 3: Cryptography

1) Explain Digital Signature in Cryptography. 2M


2) Enlist substitution techniques & explain any one. 4M
3) Write & explain DES algorithm. 4M

Chapter 4: Firewall and Intrusion Detection System

1) Explain two of each: Policies, configuration of Firewall. 2M


2) State any four limitations of firewall. 2M
3) Define firewall. Enlist types of firewalls. 2M
4) Define & explain : (i) Circuit Gateway 4M
(ii) Honey Pots
(iii) Application Gateway
(iv) Packet filter Firewall
5) Describe the DMZ with a suitable example. 4M
6) Differentiate between firewall & IDS 4M

Chapter 5: Network Security, Cyber Laws and Compliance Standards

1) Define term cyber crime & List any four types of cybercrimes. 2M
2) Classify following cyber crimes : (i) Cyber stalking (ii) Email harassment 2M
3) Define AH & ESP with respect to IP security. 2M
4) Explain Email security in SMTP. 4M
5) Explain the working of Kerberos with a diagram 4M
6) Describe COBIT framework with neat sketch. 4M

You might also like