0% found this document useful (0 votes)
44 views2 pages

Ccs354 Network Security Lab Practical Exam Questions and Guidelines

This document outlines the practical examination for the Network Security Laboratory course at Anna University for the B.E/B.Tech program. It includes a list of programming tasks and studies related to various network security algorithms and tools, such as AES, RSA, digital signatures, firewalls, and intrusion detection systems. Students are required to answer one question from a selection of topics, each with a maximum of 100 marks.

Uploaded by

praveenanand940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views2 pages

Ccs354 Network Security Lab Practical Exam Questions and Guidelines

This document outlines the practical examination for the Network Security Laboratory course at Anna University for the B.E/B.Tech program. It includes a list of programming tasks and studies related to various network security algorithms and tools, such as AES, RSA, digital signatures, firewalls, and intrusion detection systems. Students are required to answer one question from a selection of topics, each with a maximum of 100 marks.

Uploaded by

praveenanand940
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Page 1 of 2

ANNA UNIVERSITY - Chennai


B.E/B.TECH., UNIVERSITY PRACTICAL EXAMINATION APR/MAY 2025
Department of Computer Science and Engineering

Subject Code & Name: CCS354- NETWORK SECURITY LABORATORY

SET-2

SEM : VI TIME: 3 Hours

Answer any one Question Max. Marks: 100

(i) Write a program to Implement AES algorithms using java


1
(ii) Write the Study to configure Firewall, Virtual private network

(i) Write a program to Implement RSA algorithms using java


2
(ii) Write the Study to intrusion detection system using any tool

(i) Write a program to Implement diffie-hellman key exchange algorithms using


3 java
(ii) Write the Study to intrusion detection system using any tool

(i) Write a program to Implement the digital signature using algorithms SHA and
4 RSA and also verify if the hash matches with a public key
(ii) Write the Study to configure Firewall, Virtual private network

(i) Write a program to Implement AES algorithms using java


5
(ii) Write the Study to intrusion detection system using any tool

(i) Write a program to Implement RSA algorithms using java


6
(ii) Write the Study to configure Firewall, Virtual private network

(i) Write a program to Implement key exchange algorithms


7
(ii) Write the Study to intrusion detection system using any tool

8 (i) Write a program to Implement the digital signature using algorithms SHA and

RSA and also verify if the hash matches with a public key

(ii) Write the Study to configure Firewall, Virtual private network


Page 2 of 2

(i) Write a program to Implement symmetric key algorithms(AES)


9
(ii) Write the Study to intrusion detection system using any tool

(i) Write a program to Implement asymmetric key algorithms(RSA)


10
(ii) Write the Study to intrusion detection system using any tool

(i) Write the performance evaluation of network using any one of


11 network monitoring tools
(ii) Write a program to Implement symmetric key algorithms

(i) Write the Study to Check message integrity and confidentiality using SSL
12
(ii) Write a program to Implement asymmetric key algorithms

(i) Write the study of Wire shark, tcpdump and observe data transferred in
13 client- server communication using UDP/TCP and identify the UDP/TCP
datagram
(ii) Write a program to Implement key exchange algorithms

(iii) Write the study of Wire shark, tcpdump and observe data transferred in
14 client- server communication using UDP/TCP and identify the UDP/TCP
datagram
(i) Write a program to Implement key exchange algorithms

(i) Write the Study to Check message integrity and confidentiality using SSL
15
(ii) Write a program to Implement symmetric key algorithms

INTERNAL EXAMINER EXTERNAL EXAMINER

You might also like