0% found this document useful (0 votes)
33 views4 pages

CNS Sem6 Questions With Answers Template

The document contains a list of important questions for a semester 6 exam on computer network security, covering topics such as encryption algorithms, digital signatures, authentication methods, and various security protocols. Each question prompts an explanation or comparison of key concepts in cybersecurity, but answers are not provided. The questions aim to assess understanding of both theoretical and practical aspects of network security.

Uploaded by

Manish Dhanuk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views4 pages

CNS Sem6 Questions With Answers Template

The document contains a list of important questions for a semester 6 exam on computer network security, covering topics such as encryption algorithms, digital signatures, authentication methods, and various security protocols. Each question prompts an explanation or comparison of key concepts in cybersecurity, but answers are not provided. The questions aim to assess understanding of both theoretical and practical aspects of network security.

Uploaded by

Manish Dhanuk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CNS Most Important Questions – Sem 6

Exam (with Answers)


1. 1. Explain RSA algorithm with example (p=3, q=11, e=7). Show key generation steps.

Answer: [To be added...]

2. 2. Differentiate between symmetric and asymmetric encryption (5 points).

Answer: [To be added...]

3. 3. What is digital signature? How does it ensure non-repudiation?

Answer: [To be added...]

4. 4. Explain Kerberos authentication with diagram.

Answer: [To be added...]

5. 5. Describe X.509 certificate structure. How is revocation handled?

Answer: [To be added...]

6. 6. Compare SSL and TLS protocols.

Answer: [To be added...]

7. 7. Explain IPsec ESP in transport and tunnel modes.

Answer: [To be added...]

8. 8. What are firewalls? Explain types: packet-filtering, proxy, stateful.

Answer: [To be added...]

9. 9. Differentiate IDS and IPS. Explain signature vs anomaly-based detection.


Answer: [To be added...]

10. 10. What are active and passive attacks? Give examples.

Answer: [To be added...]

11. 11. Explain man-in-the-middle attack. How does SSL prevent it?

Answer: [To be added...]

12. 12. Describe Diffie–Hellman key exchange with vulnerability.

Answer: [To be added...]

13. 13. Compare viruses, worms and trojans with examples.

Answer: [To be added...]

14. 14. Why is HTTPS secure? Explain SSL handshake.

Answer: [To be added...]

15. 15. How does PGP provide email security?

Answer: [To be added...]

16. 16. What is S/MIME? How is it better than MIME?

Answer: [To be added...]

17. 17. Explain brute force and dictionary attacks.

Answer: [To be added...]

18. 18. Compare MD5 and SHA hash functions.

Answer: [To be added...]

19. 19. Differentiate block cipher and stream cipher.


Answer: [To be added...]

20. 20. What is VPN? How does it ensure security?

Answer: [To be added...]

21. 21. What is SNMP? Explain its architecture components (Manager/Agent/MIB).

Answer: [To be added...]

22. 22. Compare SNMPv1, SNMPv2 and SNMPv3 security features.

Answer: [To be added...]

23. 23. How does SNMPv3 provide authentication and encryption?

Answer: [To be added...]

24. 24. Explain SNMP message types (GetRequest, SetRequest, Trap).

Answer: [To be added...]

25. 25. What are SNMP community strings? Why are they risky?

Answer: [To be added...]

26. 26. Explain substitution and transposition techniques.

Answer: [To be added...]

27. 27. Explain Caesar cipher with weakness.

Answer: [To be added...]

28. 28. What is cryptanalysis? Explain known plaintext attack.

Answer: [To be added...]

29. 29. Compare DES and AES algorithms.


Answer: [To be added...]

30. 30. What are security associations in IPsec?

Answer: [To be added...]

31. 31. How does digital signature ensure non-repudiation?

Answer: [To be added...]

32. 32. Explain SET protocol for e-commerce.

Answer: [To be added...]

33. 33. What are security mechanisms? List 4 types.

Answer: [To be added...]

34. 34. Explain DDoS attack mitigation.

Answer: [To be added...]

35. 35. How to prevent SQL injection?

Answer: [To be added...]

You might also like