0% found this document useful (0 votes)
139 views4 pages

CCS354 Network Security Question Bank

Uploaded by

Yehaa Km
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views4 pages

CCS354 Network Security Question Bank

Uploaded by

Yehaa Km
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Question Bank

Programme B.E. / B.Tech.: Computer Science and Engineering & Artificial Intelligence and Data Science
Course Network Security
Course Code CCS354 Semester 7 Regulation AU R21

Unit I – Unit Introduction

Part – A

Sl. Blooms
Question
No. Level
1 What are the three aspects of security? L1

2 Compare public key and private key cryptosystem. L2

3 How a digital signature provides non-repudiation in communication. L1

4 Contrast between passive attack from active attack. L2

5 Define hash function. L1

6 List some examples for security attack. L1

7 What is digital signature? L1

8 Contrast message authentication code and hash function. L2


Why is public-key cryptography considered more secure for key exchange compared to
9 L1
symmetric-key cryptography?
10 Infer about elliptic curve cryptography. L2

Part – B

Sl. Blooms
Question
No. Level
1 Explain the various cryptography approaches in detail. L2
Explain the fundamental principles of cryptography, including both symmetric and asymmetric
2 encryption, comparing these two cryptographic methods in terms of their key management, L2
security, and use cases.
3 Demonstrate the specific ways that public key cryptography and conventional encryption vary. L2
Explain the concept of digital signatures and how they ensure the authenticity, integrity, non-
4 repudiation of digital communications and highlight the roles of public and private keys in this L2
process.
5 Explain the different methods in hash functions with neat diagrams. L2

6 Infer in detail the functionalities of digital signatures L2

Page 1 of 4
Course Code & Name CCS354 – NETWORK SECURITY

Unit II – Key Management and Authentication

Part – A

Sl. Blooms
Question
No. Level
1 When are the certificates revoked in X.509? L1
Show that the client C wants to communicate server S using Kerberos procedure. How can it be
2 achieved? Write the authentication dialogue? L2

3 What is meant by symmetric and asymmetric encryption? L1

4 What are the phases of IKE? L1

5 How does the Diffie-Hellman key exchange help in symmetric key distribution? L1

6 List any four password selection strategies. L1

7 List the principles of remote user authentication L1

8 Show how SHA is more secure than MD5. L2

9 Name the four requirements defined by Kerberos. L1

10 How does Kerberos use tickets to achieve secure authentication? L1

Part – B

Sl. Blooms
Question
No. Level
Outline the potential vulnerabilities and challenges in remote user authentication using
1 L2
asymmetric encryption with real-world applications.
Illustrate with examples the remote user authentication process that is utilized for both symmetric
2 L2
and asymmetric encryption.
Illustrate how protocols like Diffie-Hellman and Public Key Infrastructure address the challenges
3 L2
associated with symmetric key distribution in secure communication.
4 Outline the requirements of Kerberos system L2
Summarize RSA algorithm and perform encryption and decryption using RSA algorithm for the
5 L2
following: p=7 q=11, e=7, M=9.
6 Summarize about the elements of X509 Certificate. L2
Identify the protocol used for the following one-way authentication technique based on
asymmetric encryption and explain the protocol.
7 A -> B: IDA L2
B-> A:R1
A->B:E(PRU,R1)

Unit III – Access Control and Security

Part – A

Sl. Blooms
Question
No. Level
1 Name any four SSL protocols. L1

2 Infer the benefits of IP Security. L2

3 Define Internet Key Exchange (IKE) L1

4 Define TLS. L1

5 What is connection protocol and connection less protocol? L1

Page 2 of 4
Course Code & Name CCS354 – NETWORK SECURITY

Sl. Blooms
Question
No. Level
6 Outline primary function of the Extensible Authentication Protocol (EAP)? L2

7 Which of two services provided by SSL record protocol for SSL connection? L1

8 Contrast transport level security and message level security. L2

9 List the considerations to be followed for Web security L1

10 How does HTTPS ensure the security of data transmission? L1

Part – B

Sl. Blooms
Question
No. Level
Outline the vulnerabilities and potential attacks against the Transport Layer Security (TLS)
1 L2
protocol and the ways to mitigate them with a real time example.
Explain with the aid of a diagram the IEEE 802.1X Port-Based Network Access Control and its
2 L2
workings.
Explain how the Extensible Authentication Protocol (EAP) interacts with IEEE 802.1X for network
3 access control and discuss the role of the Authentication, Authorization, and Accounting (AAA) L2
framework in conjunction with EAP and IEEE 802.1X to provide secure network access.
Illustrate the Secure Sockets Layer (SSL) protocol and its role in securing communication over
4 L2
the internet and describe the SSL handshake process
Explain the concept of Wireless network security with real scenarios and state their advantages
5 L2
and disadvantages.
Explain with a block diagram the secure shell application and secure socket layer mechanisms in
6 L2
transport level security.

Unit IV – Application Layer Security

Part – A

Sl. Blooms
Question
No. Level
1 Define IEEE 802.1X Port-Based Network Access Control. L1

2 Outline the importance of enabling screen locks on mobile devices? L2

3 Why E-mail compatibility function in PGP needed? L1

4 Outline the key algorithms used in S/MIME? L2

5 How does PGP use a combination of cryptographic techniques to secure data? L1

6 Mention any two functionalities of S/MIME. L1

7 List out the services provided by PGP. L1


List any two factors that contribute to the higher security risks of wireless networks compared to
8 L1
wired networks.
9 Define mobile device security L1

10 What is Domain Keys Identified Mail (DKIM)? L1

Part – B

Page 3 of 4
Course Code & Name CCS354 – NETWORK SECURITY

Sl. Blooms
Question
No. Level
1 Outline the S/MIME content type and Pretty Good Privacy as concepts in email security. L2
Explain the importance of key management process in S/MIME and discuss its role in handling
2 L2
the distribution and storage of public keys.
3 Explain in detail about mobile device security and its major security concerns. L2
Outline the security challenges associated with wireless networks and discuss the key security
4 L2
mechanisms and protocols used to address these challenges.
5 Explain how the network layer's mobile device security mechanism works.

Unit V – Security Practices

Part – A

Sl. Blooms
Question
No. Level
1 Outline characteristics of firewalls. L2

2 Compare difference between a packet-filtering firewall and a stateful inspection firewall. L2

3 List classes of Intruders. L1

4 What are the advantages of Application Proxy Firewall? L1

5 Give some of the counter measures for malicious intruders in cloud computing platforms,. L1

6 What is the main purpose of cloud security? L2

7 Define clandestine. L1

8 List out the advantages of intrusion detection system over firewall. L1

9 What are major issues derived by porras about the design of a distributed IDS? L1

10 What is the need for Cloud and IoT security? L1

Part – B

Sl. Blooms
Question
No. Level
Explain intrusion detection and password management technique to implement each type of
1 L2
firewall.
Explain the key concepts of Intrusion Detection Systems (IDS) and discuss its functioning to
2 L2
detect intrusions, highlighting their advantages and limitations in securing a network.
Outline the firewall biasing technique with a diagrammatic explanation to provide the required
3 L2
security precautions in Internet of Things and cloud security.
Explain the security challenges associated with the Internet of Things, highlighting the unique
4 L2
vulnerabilities of IoT devices and propose solutions to mitigate these risks.
Construct the screened host architecture and screened subnet firewall architecture with a neat
5 L3
sketch, to provide more security for information assets.
Outline the characteristics of packet filtering firewall with a real time example, and discuss its
6 L2
advantages and limitations.

Page 4 of 4

You might also like