The document contains a series of questions related to computer security, covering topics such as definitions of key concepts, cryptography, access control, intrusion detection, and security policies. It includes brief, short, long, and comprehensive answer questions aimed at assessing knowledge in various areas of information security. The questions address both theoretical aspects and practical applications of security measures and techniques.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
2 views4 pages
Important Question Collections
The document contains a series of questions related to computer security, covering topics such as definitions of key concepts, cryptography, access control, intrusion detection, and security policies. It includes brief, short, long, and comprehensive answer questions aimed at assessing knowledge in various areas of information security. The questions address both theoretical aspects and practical applications of security measures and techniques.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Brief Answer Questions:
1. Define computer security.
2. What is access Control? 3. What is trust framework? 4. Define ICAM. 5. Define Vulnerability. 6. How many rounds are there in DES and AES? 7. What is the size of input output and key in DES? 8. What are the 4-operation involved in AES Round function? 9. What is cryptography? 10. Define information security with the help of CIA Triad. 11. What is access Control? What are the elements of access control? 12. State Biba Integrity Model 13. Encipher the plain text “Exam” using Caesar cipher, key = 23, Start with A=0 14. What is cryptography and Cryptanalysis? 15. What is APT? What could be effect of APT on our system? 16. What is hashing? List out two algorithms to get hash code. 17. Write down the advantage of digital signature? 18. Define user authentication and authorization? 19. What is intrusion? What could be the motivation of intruders? 20. What is digital signature? 21. What do you mean by Trojan horse? 22. Define active attack with example. 23. What are the types of Intrusion Detection Technique? 24. Define Cipher text. 25. What is intrusion? 26. What is authentication? 27. What is authorization? 28. Why passive attack is more dangerous than active attack? 29. What is phising attack? 30. What is Backdoor? Short Answer Questions: 31. List out the difference between passive and active security attacks. 32. Explain the difference between an attack surface and an attack tree. 33. Define computer security strategy? What could be the aspects of comprehensive security strategy. 34. List out the difference between block and stream cipher. 35. Solve 887 mod 187 36. What is message authentication? What are the scheme for message authentication? 37. Generate a secret key for symmetric encryption for given prime number q=7 and primitive root α = 3. 38. State and explain the different types of IPS. 39. Define Hash Function. What should be the properties of good Hash function. 40. List and briefly describe four common techniques for selecting or assigning passwords 41. Define Public key cryptography. suppose in a RSA system, how private key is generated from given public key? Give an example. 42. Define Intrusion Detection System and differentiate between statistical anomaly detection and rule-based detection. 43. Define Intrusion Detection System. Explain how the system can be protected once an intrusion is detected. 44. How is digital signature created? Explain with example. 45. Explain different model used in intrusion detecting system. 46. List out any five methods to be safe for computer malware. 47. Does confidentiality lead to compromise in integrity? Given your point of view. 48. What do you think, is it ethical for students or teachers to access Internet in the classroom while taking class? Explain with appropriate reasons. If you think it is unethical then how can you stop students or teachers from accessing Internet in the classroom? Long Answer Questions: 49. What are the elements of access control? Explain access Control matrix model with ACL and capability List. 50. Generate a secret key for symmetric encryption if the common prime number q=7 and a primitive root g=3. 51. Draw the Basic Block Diagram of AES Encryption. 52. Define MD4 algorithm with block diagram. 53. Write RSA algorithm. Show all the steps of the algorithm and verify the algorithm for the given message (M) = 35, and two prime numbers p=7 and q=19. 54. Explain HMAC with appropriate block diagram. 55. Define the terms digital signature and digital certificate. Explain DSS and RSA Approach for creating Digital signature. 56. What is 2FA? What are the benefits of 2FA? How 2FA Works? 57. What could be the motivation of intruders? What are the common intrusion techniques they used? Comprehensive Answer Questions: 58. What is a honeypot? List and briefly define the types of honeypots that may be deployed. Explain the location where the honeypot can be deployed. 59. What is security Policy? Explain Bell-LaPadula model and Biba integrity model in brief. 60. What is Kerberos Protocol? Explain the term Kerberos realms. What are the major components of Kerberos? Explain the Kerberos authentication process with associate figure. 61. State Algorithmic steps for the RSA Algorithm. In a public key system using RSA Algorithm encrypt and decrypt the message M=59 from given set of values p=11, q=3, and e=3. 62. Define confusion and diffusion processes. Define computer security strategy? What could be the aspects of comprehensive security strategy. 63. Discuss the key design principles to be considered for achieving effective computer security