CCS354 Network Security Question Bank
CCS354 Network Security Question Bank
Programme B.E. / B.Tech.: Computer Science and Engineering & Artificial Intelligence and Data Science
Course Network Security
Course Code CCS354 Semester 7 Regulation AU R21
Part – A
Sl. Blooms
Question
No. Level
1 What are the three aspects of security? L1
Part – B
Sl. Blooms
Question
No. Level
1 Explain the various cryptography approaches in detail. L2
Explain the fundamental principles of cryptography, including both symmetric and asymmetric
2 encryption, comparing these two cryptographic methods in terms of their key management, L2
security, and use cases.
3 Demonstrate the specific ways that public key cryptography and conventional encryption vary. L2
Explain the concept of digital signatures and how they ensure the authenticity, integrity, non-
4 repudiation of digital communications and highlight the roles of public and private keys in this L2
process.
5 Explain the different methods in hash functions with neat diagrams. L2
Page 1 of 4
Course Code & Name CCS354 – NETWORK SECURITY
Part – A
Sl. Blooms
Question
No. Level
1 When are the certificates revoked in X.509? L1
Show that the client C wants to communicate server S using Kerberos procedure. How can it be
2 achieved? Write the authentication dialogue? L2
5 How does the Diffie-Hellman key exchange help in symmetric key distribution? L1
Part – B
Sl. Blooms
Question
No. Level
Outline the potential vulnerabilities and challenges in remote user authentication using
1 L2
asymmetric encryption with real-world applications.
Illustrate with examples the remote user authentication process that is utilized for both symmetric
2 L2
and asymmetric encryption.
Illustrate how protocols like Diffie-Hellman and Public Key Infrastructure address the challenges
3 L2
associated with symmetric key distribution in secure communication.
4 Outline the requirements of Kerberos system L2
Summarize RSA algorithm and perform encryption and decryption using RSA algorithm for the
5 L2
following: p=7 q=11, e=7, M=9.
6 Summarize about the elements of X509 Certificate. L2
Identify the protocol used for the following one-way authentication technique based on
asymmetric encryption and explain the protocol.
7 A -> B: IDA L2
B-> A:R1
A->B:E(PRU,R1)
Part – A
Sl. Blooms
Question
No. Level
1 Name any four SSL protocols. L1
4 Define TLS. L1
Page 2 of 4
Course Code & Name CCS354 – NETWORK SECURITY
Sl. Blooms
Question
No. Level
6 Outline primary function of the Extensible Authentication Protocol (EAP)? L2
7 Which of two services provided by SSL record protocol for SSL connection? L1
Part – B
Sl. Blooms
Question
No. Level
Outline the vulnerabilities and potential attacks against the Transport Layer Security (TLS)
1 L2
protocol and the ways to mitigate them with a real time example.
Explain with the aid of a diagram the IEEE 802.1X Port-Based Network Access Control and its
2 L2
workings.
Explain how the Extensible Authentication Protocol (EAP) interacts with IEEE 802.1X for network
3 access control and discuss the role of the Authentication, Authorization, and Accounting (AAA) L2
framework in conjunction with EAP and IEEE 802.1X to provide secure network access.
Illustrate the Secure Sockets Layer (SSL) protocol and its role in securing communication over
4 L2
the internet and describe the SSL handshake process
Explain the concept of Wireless network security with real scenarios and state their advantages
5 L2
and disadvantages.
Explain with a block diagram the secure shell application and secure socket layer mechanisms in
6 L2
transport level security.
Part – A
Sl. Blooms
Question
No. Level
1 Define IEEE 802.1X Port-Based Network Access Control. L1
Part – B
Page 3 of 4
Course Code & Name CCS354 – NETWORK SECURITY
Sl. Blooms
Question
No. Level
1 Outline the S/MIME content type and Pretty Good Privacy as concepts in email security. L2
Explain the importance of key management process in S/MIME and discuss its role in handling
2 L2
the distribution and storage of public keys.
3 Explain in detail about mobile device security and its major security concerns. L2
Outline the security challenges associated with wireless networks and discuss the key security
4 L2
mechanisms and protocols used to address these challenges.
5 Explain how the network layer's mobile device security mechanism works.
Part – A
Sl. Blooms
Question
No. Level
1 Outline characteristics of firewalls. L2
5 Give some of the counter measures for malicious intruders in cloud computing platforms,. L1
7 Define clandestine. L1
9 What are major issues derived by porras about the design of a distributed IDS? L1
Part – B
Sl. Blooms
Question
No. Level
Explain intrusion detection and password management technique to implement each type of
1 L2
firewall.
Explain the key concepts of Intrusion Detection Systems (IDS) and discuss its functioning to
2 L2
detect intrusions, highlighting their advantages and limitations in securing a network.
Outline the firewall biasing technique with a diagrammatic explanation to provide the required
3 L2
security precautions in Internet of Things and cloud security.
Explain the security challenges associated with the Internet of Things, highlighting the unique
4 L2
vulnerabilities of IoT devices and propose solutions to mitigate these risks.
Construct the screened host architecture and screened subnet firewall architecture with a neat
5 L3
sketch, to provide more security for information assets.
Outline the characteristics of packet filtering firewall with a real time example, and discuss its
6 L2
advantages and limitations.
Page 4 of 4