NIS UNITWISE QB - Ask
NIS UNITWISE QB - Ask
Unitwise Question
Unit-1. Introduction to Computer & Information Security (2/4/6-Marks)
16. Expalin DOS with naet diagram.Expalin DDOS with neat diagram.
20. Explain Man-in-the-Midlle attack with help of diagram. Explain TCP/IP Hacking attacks.
21. Describe following terms: 1) Application Patches 2) Hotfix
Unitwise Question
Unit-2.Authenticaton & Access Control (2/4/6-Marks)
Unitwise Question
Unit-3. Cryptogaphy (2/4/6-Marks)
1. Define term Plaintext.
2. Deine term ciphertext.
3. What is Cryptography? State its applications.
4. Explain the term Cryptanalysis.
5. Explain the term Cryptology.Define term Encryption.
6. Define term Decryption.
7. What are the techniques for transforming plain text to ciphertext? Expalin any one in detail.
8. State the Substitution cipher. List the substitution cipher techniques & Explain any two.
9. Convert plaint-ext to cipher text by using simple columnar techniques of the following sentence: “ALL
IS WELL FOR YOUR EXAM”
10. Consider a palin ext message “I AM A HACKER”. Encrypt it with help of caesar’s cipher techniques
with steps.
11. Consider plain text “INFORMATION” & convert given plain text to cipher text using caesar cipher
with shift of position three write down steps in encryption.
12. Explain simple columnar transposition techniques with algorithm & example.
13. Comparison of substitution cipher & transmission cipher.
14. What is steganography? What are its application.
15. Describe symmetric key cryptography.
16. Describe DES algorithm with suitable algorithm .
17. Describe digital signature mechanism with neat diagram.
18. Explain integrity & non-repudiation with respect to cryptography.
19. Difference between symmetric & asymmetric cryptography.
Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025
Unitwise Question
Unit-4. Firewall & Intrusion Detection System (2/4/6-Marks)
1. Explain need for firewall & explain one of the types of firewall with diagram.
2. Explain one of the type of firewall with diagram.
3. Describe packet filter router firewall with neat diagram.
4. List types of firewall . Explain packet filtering firewall with diagram.
5. Sate any limitations of firewall.
6. Describe DMZ with suaitable diagram.
7. Describe with suitable diagram intrusion detection system.
8. What is IDS.
9. Explain host based IDS with its advantages & disadvantages.
10. Explain network based IDS.
11. Explain Honeypots.
Matoshri Education Society’s
Matoshri Asarabai Polytechnic, Eklahare
(All AICTE Approved Programs)
Department: Information Technology
Academic Year: 2024-2025
Unitwise Question
Unit-5. Network Security & Standards (2/4/6-Marks)