0% found this document useful (0 votes)
9 views5 pages

INS Question Bank

The document is a question bank for a B.Tech course on Information and Network Security, covering various topics such as security planning, technology, authentication applications, and encryption techniques. It includes questions on the CIA triad, OSI security architecture, firewalls, and intrusion detection systems, as well as practical problems related to cryptography. The content is organized into units, each focusing on different aspects of information security and network protection.

Uploaded by

harshith1477
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

INS Question Bank

The document is a question bank for a B.Tech course on Information and Network Security, covering various topics such as security planning, technology, authentication applications, and encryption techniques. It includes questions on the CIA triad, OSI security architecture, firewalls, and intrusion detection systems, as well as practical problems related to cryptography. The content is organized into units, each focusing on different aspects of information security and network protection.

Uploaded by

harshith1477
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SCHOOL OF COMPUTING AND INFORMATION TECHNOLOGY

6th SEM B.Tech ( ISE ) – A & B


Course Code: B22CI0602
Course Title: Information and Network Security
Question Bank
UNIT-1
Planning for Security: Introduction; Information Security Policy, Standards, and
Practices; The Information Security Blueprint; Contingency plan and a model for
contingency plan.
Introduction to Security Technology: Physical design; Firewalls; Protecting Remote
Connections.; Intrusion Detection Systems (IDS); Honey Pots, Honey Nets, and
Padded cell systems; Scanning and Analysis Tools.

1. What are the primary objectives of information security?


2. Explain the CIA triad with examples.
3. Describe common security threats and their impact on organizations.
4. Explain the difference between security policies, standards, and practices.
5. How can an organization implement an effective security policy?
6. Define an information security blueprint and its significance.
7. What are the key elements of an effective security blueprint?
8. How does a security blueprint support business continuity?
9. What are the essential components of a contingency plan?
10. Explain the steps involved in developing a contingency plan.
11. Describe different models for contingency planning.
12. What is the role of physical design in security architecture?
13. Explain how firewalls enhance network security.
14. Describe the key differences between IDS, Honey Pots, and Honey Nets.
15. What are the different types of firewalls and how do they operate?
16. How can organizations secure remote connections effectively?
17. Describe the role of VPNs in protecting remote connections.
18. What are IDS and how does it function?
19. Explain the purpose of honey pots and honey nets in threat detection.
20. Describe common scanning and analysis tools used in network security.
UNIT-2
Computer Security Concepts: The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, A Model for Network Security Symmetric
Ciphers, Classical Encryption Techniques, Symmetric Cipher Model, -Substitution
Techniques, Transposition Techniques, Steganography, Block Ciphers and the Data
Encryption, The Data Encryption Standard, ADES Example, Block Cipher Design
Principles, Advanced Encryption Standard. Public-Key Crypto systems, The RSA
Algorithm, Diffie-Hellman Key Exchange,

1. Explain the OSI security architecture and its importance.


2. Describe the key security threats faced at different OSI layers.
3. What are the main components of the OSI security model?
4. Define and classify different types of security attacks.
5. What are the key security services outlined by the OSI model?
6. Explain the role of security mechanisms in ensuring data protection.
7. Describe the basic structure of a network security model.
8. Explain the symmetric cipher model with a suitable diagram.
9. Explain the concept of steganography with real-life examples.
10. Describe substitution techniques with examples.
11. What is the difference between substitution and transposition techniques?
12. What is a block cipher, and how does it differ from stream ciphers?
13. Explain different types of modes of operations in block cipher.
14. Describe the structure of the Data Encryption Standard (DES).
15. Explain the key concepts behind DES with an example.
16. What are the principles for designing an effective block cipher?
17. Explain the Advanced Encryption Standard (AES) algorithm in detail.
18. What is the role of public-key cryptography in secure communication?
19. Explain the RSA algorithm with a detailed example.
20. Describe the steps involved in the Diffie-Hellman key exchange process.
Problems based Questions:
1. Convert Plain text using Caesar’s Cipher method (Shift =3). Plain Text:
ABCDEFGHIJKLXYZ
2. Apply simple Columnar Transposition Technique for text “WELCOME COME” and
Key= ZEBRAS
3. Construct a playfair matrix with the key “occurrence”. Generate the cipher text for the
plaintext “Tall trees”

4. Encrypt the message “Good morning” using the Hill Cipher with the key
5. Use Hill cipher to encrypt the text DEF. The key to be used

6.
7.
UNIT 3

Authentication Applications: Kerberos, X.509 Directory Authentication Service.


Electronic Mail Security: Pretty Good Privacy (PGP); S/MIME.

Transport level Security, Web Security Considerations: Web Security Threats, Web
Traffic Security Approaches, SSL Architecture, SSL Record Protocol, Change Cipher
Spec Protocol, Alert Protocol, Handshake Protocol, Cryptographic Computations.

1. Explain the architecture and working of Kerberos.


2. Describe the ticket granting service (TGS) and authentication service (AS) in
Kerberos.
3. What is an X.509 certificate? Explain its structure and how it is used in directory
authentication services.
4. Compare Kerberos and X.509 authentication methods.
5. Explain the working of Pretty Good Privacy (PGP) and its key features.
6. Describe the functions of S/MIME in securing electronic mails.
7. Compare PGP and S/MIME with respect to security features and use cases.
8. What are the primary goals of Transport Layer Security (TLS)? Explain the security
services it provides.
9. Discuss the steps involved in a TLS handshake.
10. List and explain various types of web security threats.
11. What are different web traffic security approaches? Explain with examples.
12. Explain the SSL architecture with a neat diagram.
13. Describe the structure and operation of the SSL Record Protocol.
14. What is the purpose of the Change Cipher Spec Protocol in SSL?
15. Explain the role of the Alert Protocol in SSL/TLS.
16. Describe the SSL Handshake Protocol and the sequence of messages exchanged.
17. What cryptographic computations are performed during an SSL handshake? Explain
key generation and cipher negotiation.
18. Explain how SSL uses symmetric and asymmetric cryptography together.
UNIT 4

Firewalls: Introduction, Identification, Authentication, Authorization, Accountability,


Firewall processing modes, Firewalls categorized by generation, Firewalls categorized by
structure, Firewall architectures, selecting of right firewalls, Content Filters, Protecting
remote connections, Remote Access, Virtual Private Networks. Intrusion Detection and
Prevention Systems: IDPS terminology, use of an IDPS, Types of IDPS, IDPS detection
methods, IDPS response, Selecting IDPS approaches and products, Strength and limitations
of IDPS, Honeypots. Tools: Auditing tools, Pocket Chacking, wireless hack walk through

1. What is a firewall? Explain its primary functions.


2. Differentiate between Identification, Authentication, Authorization, and
Accountability in firewall systems.
3. Explain various firewall processing modes with suitable examples.
4. How are firewalls categorized by generation? Describe with examples.
5. Explain different firewall structures (like packet-filtering, proxy firewalls, etc.).
6. Discuss various firewall architectures with a neat diagram (like bastion host, screened
subnet, dual-homed host).
7. What factors should be considered when selecting the right firewall for an
organization?
8. What are content filters? How do they enhance firewall security?
9. Explain how firewalls protect remote connections.
10. What is a Virtual Private Network (VPN)? How does it help in securing remote
access?
11. Define IDPS and explain important IDPS terminologies.
12. Discuss the need for an IDPS in an enterprise network.
13. Explain different types of IDPS (Network-based, Host-based, Wireless, etc.).
14. What are the various detection methods used by IDPS (Signature-based vs Anomaly-
based)?
15. Describe how IDPS respond to intrusions.
16. How do you select the appropriate IDPS approaches and products for an organization?
17. What are the strengths and limitations of IDPS?
18. What is a honeypot? How is it used in intrusion detection and prevention?
19. What are auditing tools? How are they used in network security?
20. Explain packet checking and its role in intrusion detection.
21. What is a wireless hacking walkthrough? Explain basic steps typically involved in a
wireless security assessment.
Problems based Questions:
1. P and Q are two prime numbers. P=7 and Q=17.Take public key E=5.If plaintext
value is 6, then what will be ciphertext value according to RSA algorithm?
2. In a public key system using RSA, the ciphertext intercepted is C=10 which is sent to
the user whose public key is e=5, n=35.What is the plaintext M?
3. Calculate ciphertext in case of RSA if p=3, q=11, e=3, M=5.
4. Perform encryption and decryption using the RSA algorithm for p=3, q=11, e=7,
M=5.
5. The encryption algorithm to be used is RSA. Given two prime numbers 11 and 3 and
public key(e) is 3. Calculate the decryption key and Calculate the ciphertext if the
given plaintextis7.
6. For Diffie-Hellman algorithm, two publicaly known numbers are prime number 353
and primitive root of it is 3. A selects the random integer 97 and B selects
233.Compute the public key of A and B. Also compute common secret key.

You might also like