CCS354 Network Security
CCS354 Network Security
QUESTION BANK
R - 2021
Prepared by
Dr. P. Chellammal Page 1
J. J. College of Engineering and Technology, Trichy - 09
DEPARTMENT OFCOMPUTER SCIENCE AND ENGINEERING
Prepared by
Dr. P. Chellammal Page 2
J. J. College of Engineering and Technology, Trichy - 09
INSTITUTE VISION & MISSION
VISION:
MISSION:
VISION:
To provide the quality education in Computer Science and Engineering and to mould the
students into self-confident and professionally competent individuals.
MISSION:
Prepared by
Dr. P. Chellammal Page 3
J. J. College of Engineering and Technology, Trichy - 09
PROGRAM EDUCATIONAL OBJECTIVES (PEOs)
Apply their technical competence in computer science to solve real world problems, with
PEO1
technical and people leadership.
PEO2 Conduct cutting edge research and develop solutions on problems of social relevance.
Work in a business environment, exhibiting team skills, work ethics, adaptability and
PEO3
lifelong learning.
Prepared by
Dr. P. Chellammal Page 4
J. J. College of Engineering and Technology, Trichy - 09
Project management and finance: Demonstrate knowledge and understanding of the
PO11 engineering and management principles and apply these to one‘s own work, as a member
and leader in a team, to manage projects and in multidisciplinary environments.
Life-long learning: Recognize the need for, and have the preparation and ability to
PO12 engage in independent and life-long learning in the broadest context of technological
change.
Exhibit design and programming skills to build and automate business solutions using
PSO1
cutting edge technologies.
Ability to work effectively with various engineering fields as a team to design, build
PSO3
and develop system applications.
Prepared by
Dr. P. Chellammal Page 5
J. J. College of Engineering and Technology, Trichy - 09
CCS354 NETWORK SECURITY L T P C
2 0 2 3
COURSE OBJECTIVES:
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication, and
digital signatures.
Total: 30 PERIODS
Prepared by
Dr. P. Chellammal Page 6
J. J. College of Engineering and Technology, Trichy - 09
COURSEOUTCOMES
CO3 Evaluate the security techniques applied to network and transport layer.
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
CO2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
CO3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
CO4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
CO5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVG 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
TEXT BOOK
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings, 2014,
Pearson, ISBN 13:9780133354690.
REFERENCE BOOKS
PART- A
CO Comple
Q.No Question BT Level
Mapping xity
1 Define cryptography. CO1 Remember Low
Differentiate between symmetric and asymmetric
2 CO1 Understand Low
encryption.
3 What is a hash function? CO1 Understand Low
4 List any two applications of cryptography. CO1 Remember Low
Mention the role of authentication in network
5 CO1 Remember Low
security.
6 Define digital signature. CO1 Remember Low
7 What are the advantages of public-key cryptography? CO1 Understand Low
How does message integrity differ from
8 CO1 Understand Low
confidentiality?
What is the purpose of key exchange in
9 CO1 Understand Low
cryptography?
10 Compare block and stream ciphers. CO1 Evaluate High
Mention the characteristics of a good encryption
11 CO1 Remember Low
algorithm.
12 What is a brute force attack? CO1 Understand Low
Specify the role of the sender and receiver in digital
13 CO1 Understand Low
signature verification.
Differentiate between substitution and transposition
14 CO1 Understand Low
ciphers.
Calculate the ciphertext for the following using one-
time pad cipher.
15 CO1 Create High
Plaintext: R O C K
Keyword: B O T S
Connect the given text “anna university” into cipher
16 CO1 Apply Medium
text using Rail fence technique.
How substitution cipher is different from
17 CO1 Understand Low
transposition cipher. Give example for each method?
What is the difference between authentication and
18 CO1 Understand Low
authorization?
State the importance of confidentiality in network
19 CO1 Remember Low
security.
Prepared by
Dr. P. Chellammal Page 8
J. J. College of Engineering and Technology, Trichy - 09
Which cryptographic technique is used for digital
20 CO1 Understand Low
signatures?
What is the main use of a hash function in network
21 CO1 Understand Low
security?
22 What is the primary purpose of a digital signature? CO1 Understand Low
23 What is the role of Kerberos in authentication? CO1 Understand Low
Determine the GCD of (24140,16762) using Euclid‟s
24 CO1 Create High
algorithm.
Determine the GCD of (1970,1066) using Euclid‟s
25 CO1 Create High
algorithm.
PART- B
Prepared by
Dr. P. Chellammal Page 10
J. J. College of Engineering and Technology, Trichy - 09
Find n and (n)by using e RSA encryption method
30 CO1 Apply Medium
with p 11 and q 17 as the two primes.
UNIT II
PART- A
CO Comple
Q.No Question BT Level
Mapping xity
1 Define key management. CO2 Remember Low
2 What is the purpose of key distribution? CO2 Understand Low
3 State the X.509 certificates. CO2 Remember Low
List the components of a Public Key Infrastructure
4 CO2 Remember Low
(PKI).
5 How does symmetric key distribution work? CO2 Understand Low
6 What is Kerberos, and why is it used? CO2 Understand Low
Compare symmetric and asymmetric key
7 CO2 Evaluate High
authentication.
8 What is the purpose of remote user authentication? CO2 Understand Low
9 Define an authentication protocol. CO2 Remember Low
How does asymmetric encryption support
10 CO2 Understand Low
authentication?
11 What are the advantages of using PKI? CO2 Understand Low
12 Define digital certificate. CO2 Remember Low
13 What is the role of a Certification Authority (CA)? CO2 Understand Low
PART- B
Prepared by
Dr. P. Chellammal Page 11
J. J. College of Engineering and Technology, Trichy - 09
Compare and contrast X.509 Certificates and
3 CO2 Evaluate High
Kerberos Authentication.
Illustrate the working of the Kerberos authentication
4 CO2 Analyze Medium
system.
How does asymmetric encryption help in remote user
5 CO2 Understand Medium
authentication?
Discuss the challenges in key distribution in wireless
6 CO2 Understand Medium
networks.
Explain the importance of certificate authorities
7 CO2 Understand Medium
(CAs) in public key management.
Compare various user authentication techniques used
8 CO2 Evaluate High
in modern security systems.
Explain the role of digital certificates in securing
9 CO2 Understand Medium
network communications.
Evaluate the effectiveness of multi-factor
10 CO2 Evaluate High
authentication techniques.
Users Alice and Bob use the Diffie-Hellman key
exchange technique with a common prime q=83 and
a primitive root α=5.
i. If Alice has a private key XA=6, what is
11 CO2 Apply Medium
Alice‟s public key YA?
ii. If Bob has a private key XB=10, what is
Bob‟s public key YB?
iii. What is the shared secret key?
State Chinese Remainder Theorem and find X for the
given set of congruent equations using CRT X=1
12 CO2 Apply Medium
(mod 5) X=2 (mod 7) X=3 (mod 9)
X=4 (mod 11).
UNIT III
ACCESS CONTROL AND SECURITY
PART- A
CO Comple
Q.No Question BT Level
Mapping xity
1 Define network access control. CO3 Remember Low
What is the purpose of the Extensible Authentication
2 CO3 Understand Low
Protocol (EAP)?
Prepared by
Dr. P. Chellammal Page 12
J. J. College of Engineering and Technology, Trichy - 09
3 Define IEEE 802.1X. CO3 Remember Low
4 What are the components of IP Security (IPSec)? CO3 Understand Low
5 Define Internet Key Exchange (IKE). CO3 Remember Low
How does Transport Layer Security (TLS) improve
6 CO3 Understand Low
web security?
7 What is HTTPS? CO3 Remember Low
8 Differentiate between SSL and TLS. CO3 Understand Low
9 What are the benefits of using Secure Shell (SSH)? CO3 Understand Low
10 Define the role of digital certificates in TLS. CO3 Remember Low
11 Define VPN and its security benefits. CO3 Remember Low
12 What is meant by end-to-end encryption? CO3 Understand Low
13 How does IPsec ensure secure communication? CO3 Understand Low
Mention any two limitations of network access
14 CO3 Remember Low
control.
15 How does SSH ensure secure communication? CO3 Understand Low
PART- B
CO Comple
Q.No Question BT Level
Mapping xity
Explain the working of IEEE 802.1X port-based
1 CO3 Understand Medium
network access control.
Discuss the role of the Internet Key Exchange (IKE)
2 CO3 Understand Medium
in IP security.
Compare and contrast SSL and TLS protocols with
3 CO3 Evaluate High
their security features.
Explain how HTTPS ensures secure web
4 CO3 Understand Medium
communication.
5 Describe the working of Secure Shell (SSH) protocol. CO3 Understand Medium
Analyze the security vulnerabilities in transport layer
6 CO3 Analyze High
protocols.
Discuss the role of Network Access Control (NAC) in
7 CO3 Understand Medium
enterprise security.
Illustrate how IPsec provides confidentiality and
8 CO3 Analyze Medium
integrity in network communication.
Compare the effectiveness of different transport-layer
9 CO3 Evaluate High
security mechanisms.
Evaluate the importance of end-to-end encryption in
10 CO3 Evaluate High
transport layer security.
Prepared by
Dr. P. Chellammal Page 13
J. J. College of Engineering and Technology, Trichy - 09
UNIT IV
APPLICATION LAYER SECURITY
PART- A
CO Comple
Q.No Question BT Level
Mapping xity
1 Define email security. CO4 Remember Low
2 What is Pretty Good Privacy (PGP)? CO4 Understand Low
3 State S/MIME. CO4 Remember Low
What is the purpose of Domain Keys Identified Mail
4 CO4 Understand Low
(DKIM)?
5 How does email encryption work? CO4 Understand Low
6 Define mobile device security. CO4 Remember Low
7 How does PGP provide authentication? CO4 Understand Low
8 What is the role of digital signatures in email security? CO4 Understand Low
Mention the importance of email authentication
9 CO4 Remember Low
protocols.
10 List two advantages of S/MIME over PGP. CO4 Remember Low
11 Define spam filtering in email security. CO4 Remember Low
12 What are the security threats in wireless networks? CO4 Understand Low
How does multi-factor authentication improve mobile
13 CO4 Understand Low
security?
14 List the impact of phishing attacks on email security. CO4 Remember Low
How does SSL/TLS contribute to secure web
15 CO4 Understand Low
browsing?
PART- B
CO Comple
Q.No Question BT Level
Mapping xity
Explain how Pretty Good Privacy (PGP) provides
1 CO4 Understand Medium
secure email communication.
Discuss the security features of S/MIME and its role
2 CO4 Understand Medium
in email security.
Compare Domain Keys Identified Mail (DKIM) with
3 CO4 Evaluate Medium
other email security techniques.
Describe the major security threats to mobile devices
4 CO4 Understand Medium
and their countermeasures.
Prepared by
Dr. P. Chellammal Page 14
J. J. College of Engineering and Technology, Trichy - 09
Analyze the challenges in implementing wireless
5 CO4 Analyze Medium
network security.
Evaluate different email security standards used in
6 CO4 Evaluate High
enterprises.
Illustrate the role of encryption in securing wireless
7 CO4 Analyze Medium
networks.
Discuss the impact of phishing and spoofing on
8 CO4 Understand Medium
application layer security.
Explain how secure email protocols protect against
9 CO4 Understand Medium
cyber threats.
Compare the effectiveness of security mechanisms in
10 CO4 Evaluate High
protecting email communications.
UNIT V
SECURITY PRACTICES
PART- A
CO Comple
Q.No Question BT Level
Mapping xity
1 Define firewall. CO5 Remember Low
2 List different types of firewalls. CO5 Remember Low
Give the purpose of an Intrusion Detection System
3 CO5 Understand Low
(IDS).
4 Define the term Intrusion Detection System. CO5 Remember Low
5 How does a firewall enhance security? CO5 Understand Low
6 What is blockchain security? CO5 Understand Low
7 Name the key characteristics of blockchain technology CO5 Remember Low
What is the primary function of a firewall in network
8 CO5 Understand Low
security?
Mention the role of an Intrusion Detection System
9 CO5 Remember Low
(IDS) in preventing network attacks.
How does a stateful firewall differ from a stateless
10 CO5 Understand Low
firewall in handling network traffic?
Differentiate Network-Based IDS (NIDS) and Host-
11 CO5 Understand Low
Based IDS (HIDS).
How would you assess the effectiveness of a firewall
12 CO5 Understand Low
in securing a corporate network?
Prepared by
Dr. P. Chellammal Page 15
J. J. College of Engineering and Technology, Trichy - 09
What is a blockchain, and how does it ensure data
13 CO5 Understand Low
integrity?
List the various types of firewalls used in
14 CO5 Remember Low
cybersecurity
What is the purpose of password management in
15 CO5 Understand Low
intrusion detection?
Mention common security challenges associated with
16 CO5 Remember Low
cloud computing
What are the typical vulnerabilities found in IoT
17 CO5 Understand Low
devices?
List the significance of firmware updates in
18 CO5 Remember Low
maintaining IoT security.
PART- B
CO Comple
Q.No Question BT Level
Mapping xity
Explain the working and types of firewalls used in
1 CO5 Understand Medium
network security.
Describe how Intrusion Detection Systems (IDS)
2 CO5 Understand Medium
detect and prevent cyber threats.
Compare various password management techniques
3 CO5 Evaluate Medium
for secure authentication.
Discuss the advantages and limitations of blockchain
4 CO5 Understand Medium
security.
Explain how cloud security mechanisms ensure data
5 CO5 Understand Medium
protection.
Evaluate the effectiveness of different intrusion
6 CO5 Evaluate High
detection systems.
Analyze the challenges in securing Internet of Things
7 CO5 Analyze Medium
(IoT) devices.
Illustrate the placement and configuration of firewalls
8 CO5 Analyze Medium
in enterprise networks.
Compare the security implications of traditional data
9 CO5 Evaluate High
storage versus cloud storage.
Evaluate the impact of weak password policies on
10 CO5 Evaluate High
organizational security.
Evaluate the role of artificial intelligence in enhancing
11 CO5 Evaluate High
cyber security.
Propose a new security framework to address
12 CO5 Analyze Medium
emerging threats in IoT ecosystems.
Design a simple firewall rule set for a small office
13 network, focusing on allowing web traffic and CO5 Analyze Medium
denying all other inbound traffic.
Prepared by
Dr. P. Chellammal Page 16
J. J. College of Engineering and Technology, Trichy - 09
Describe how a consensus mechanism works in a
14 CO5 Understand Medium
blockchain network.
How can blockchain technology be applied to improve
15 CO5 Understand Medium
the transparency of financial transactions?
Evaluate the potential security risks associated with
16 using blockchain in a supply chain management CO5 Evaluate High
system.
Develop a training program to educate employees on
17 CO5 Create High
effective password management techniques
Construct a blockchain-based system to enhance
18 CO5 Create High
supply chain transparency
Demonstrate a disaster recovery plan tailored for
19 CO5 Create High
cloud-hosted applications
Assess the risks associated with multi-tenancy in
20 CO5 Analyze Medium
cloud environments.
Analyze the differences between signature-based and
21 CO5 Analyze Medium
anomaly-based intrusion detection methods.
Apply blockchain principles to create a secure and
22 CO5 Apply Medium
transparent voting system.
Develop a security protocol for an IoT-based home
23 CO5 Create High
automation system.
Assess the effectiveness of IDS solutions in
24 CO5 Analyze Medium
preventing data breaches.
How can organizations ensure data confidentiality and
integrity when utilizing multi-tenant cloud
25 CO5 Understand Medium
environments where resources are shared among
multiple clients?
Prepared by
Dr. P. Chellammal Page 17
J. J. College of Engineering and Technology, Trichy - 09
THANKYOU
Prepared by
Dr. P. Chellammal Page 18
J. J. College of Engineering and Technology, Trichy - 09