0% found this document useful (0 votes)
35 views6 pages

NIS UNITWISE QB - Ask

The document outlines the course structure and unit-wise questions for the Network and Information Security (NIS-22620) program at Matoshri Asarabai Polytechnic for the academic year 2024-2025. It covers various topics including computer security, authentication, cryptography, firewalls, intrusion detection systems, and network security standards. Each unit contains multiple questions aimed at assessing students' understanding of key concepts and practices in information technology security.

Uploaded by

Sahil Tarle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views6 pages

NIS UNITWISE QB - Ask

The document outlines the course structure and unit-wise questions for the Network and Information Security (NIS-22620) program at Matoshri Asarabai Polytechnic for the academic year 2024-2025. It covers various topics including computer security, authentication, cryptography, firewalls, intrusion detection systems, and network security standards. Each unit contains multiple questions aimed at assessing students' understanding of key concepts and practices in information technology security.

Uploaded by

Sahil Tarle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Matoshri Education Society’s

Matoshri Asarabai Polytechnic, Eklahare


(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025

Name of Course: Network and Information Security (NIS- 22620)

Unitwise Question
Unit-1. Introduction to Computer & Information Security (2/4/6-Marks)

1. Define Security. Describe different types of securities in organization.

2. State the need of computer security.

3. Expalin security basics in detail.

4. Explain the term Assets.

5. Explain the term vulnerability.

6. Explain risk & threats analysis .

7. Explain the concepts of risk management with its components.

8. Define counter measure in computer system.

9. Give at least four types of threats for computer.

10. What is virus.

11. Describe the different phases of virus with suitable example.

12. Explain at least six types of viruses.

13. Diffrentiate betwwen virus & Warms.

14. Describe Isiders & Intruders. Who is more dangerous.

15. Explain any risk attacks on computer system security.

16. Expalin DOS with naet diagram.Expalin DDOS with neat diagram.

17. Expalin back doors & trap doors attacks.

18. Expalin sniffing attack.

19. Expalin spoofing attack.

20. Explain Man-in-the-Midlle attack with help of diagram. Explain TCP/IP Hacking attacks.
21. Describe following terms: 1) Application Patches 2) Hotfix

22. Define Information.

23. State need & importance of information.What is information classification.

24. Draw & explain CIA triad.


Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025

Name of Course: Network and Information Security (NIS- 22620)

Unitwise Question
Unit-2.Authenticaton & Access Control (2/4/6-Marks)

1. Explain the following terms to security. 1) Identification 2) Authentication


2. What is shoulder surfing? How it can be prevented.
3. What is piggybacking? How it can be prevented?
4. Describe dumpster diving with its prevention mechanism?
5. What is Bio metrics Access control. Explain with diagram with advantages.
6. Describe the classification of biometrics characteristics.
7. Explain the Access control.
8. Describe term access.
9. Explain the following to security: 1) Authentication 2)Authorization
10. Describe following access control policies in detail. 1)mDAC 2) MAC 3) RBAC
Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025

Name of Course: Network and Information Security (NIS- 22620)

Unitwise Question
Unit-3. Cryptogaphy (2/4/6-Marks)
1. Define term Plaintext.
2. Deine term ciphertext.
3. What is Cryptography? State its applications.
4. Explain the term Cryptanalysis.
5. Explain the term Cryptology.Define term Encryption.
6. Define term Decryption.
7. What are the techniques for transforming plain text to ciphertext? Expalin any one in detail.
8. State the Substitution cipher. List the substitution cipher techniques & Explain any two.
9. Convert plaint-ext to cipher text by using simple columnar techniques of the following sentence: “ALL
IS WELL FOR YOUR EXAM”
10. Consider a palin ext message “I AM A HACKER”. Encrypt it with help of caesar’s cipher techniques
with steps.
11. Consider plain text “INFORMATION” & convert given plain text to cipher text using caesar cipher
with shift of position three write down steps in encryption.
12. Explain simple columnar transposition techniques with algorithm & example.
13. Comparison of substitution cipher & transmission cipher.
14. What is steganography? What are its application.
15. Describe symmetric key cryptography.
16. Describe DES algorithm with suitable algorithm .
17. Describe digital signature mechanism with neat diagram.
18. Explain integrity & non-repudiation with respect to cryptography.
19. Difference between symmetric & asymmetric cryptography.
Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025

Name of Course: Network and Information Security (NIS- 22620)

Unitwise Question
Unit-4. Firewall & Intrusion Detection System (2/4/6-Marks)

1. Explain need for firewall & explain one of the types of firewall with diagram.
2. Explain one of the type of firewall with diagram.
3. Describe packet filter router firewall with neat diagram.
4. List types of firewall . Explain packet filtering firewall with diagram.
5. Sate any limitations of firewall.
6. Describe DMZ with suaitable diagram.
7. Describe with suitable diagram intrusion detection system.
8. What is IDS.
9. Explain host based IDS with its advantages & disadvantages.
10. Explain network based IDS.
11. Explain Honeypots.
Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025

Name of Course: Network and Information Security (NIS- 22620)

Unitwise Question
Unit-5. Network Security & Standards (2/4/6-Marks)

1. Explain Kerberos with their usage.


2. What is Kerberos? How it Works.
3. Explain the Kerberos with help of suitable diagram.
4. Explain IPSec security with help of diagram.
5. Describe AH & ESP odes of IPSec.
6. Explain E-mil Security techniques.
7. Explain working principles of SMTP.
8. Describe the working of PEM with refernce to e-mail security.
9. Describe PGP with suitable diagram.
10. Explain the process of cyber crime investigation.
11. Define the term cyber crime.
12. Define Hacking. Explain different types of hackers.
13. What is pornography.
14. Describe ISO 27001.
15. Describe ISO 20000.
16. Describe ITIL Framework.
17. Describe COBIT framework with neat diagram.

You might also like