Network Security - Unit Wise Questions
1. Define passive attack and active attack. Explain the OSI security architecture.
AI is thinking...
1. Explain the basic computer security with example.
AI is thinking...
1. How can you differentiate data integrity from system integrity? Briefly discuss the catagories of security services.
AI is thinking...
1. What is nonrepudiation of origin? How connection confidentiality differs from connectionless confidentlity?
AI is thinking...
2. What are the disadvantages of asymmetric cryptography ? Describe the components of Public Key Infrastructure.
AI is thinking...
2. What is the use of master (permanent) keys in security? Write a protocol to share public keys using public-key authority scheme.
AI is thinking...
2. What is the role of CRL issuer in public key infrastructure? How revocation request and cross certification functions are executed in PXIX?
AI is thinking...
3. What are the principle differences between version 4 and version 5 of Kerberos? Differentiate between pre-shared key and extensible authentication protocol for authenticating devices onto a wireless networks.
AI is thinking...
4. Explain different services provided by PGP.
AI is thinking...
3. Explain the distribution of public keys with practical example.
AI is thinking...
3. Assume an open distributed network environment in which users at workstations wish to access services on servers distributed throughout the network. Now discuss how you can use Kerberos protocol for secured service communication between users and servers in the environment.
AI is thinking...
3. What do you mean by reply attack? Discuss the roles of Authenticating Server and Ticket Granting Server in Kerberos protocol.
AI is thinking...
5. Explain the principle categories of SET participants.
AI is thinking...
4. What basic security services do the SSL Record Protocol provides for SSL Connections? Mention details of the operations that the SSL Record Protocol executes for ensuring the basic security services.
AI is thinking...
4. What is the use of identity in network security? Describe the principal elements of an identify management system.
AI is thinking...
4. Explain the user authentication principles with example.
AI is thinking...
5. What do you mean by local forwarding in SSH? Describe about the possible channel types recognized in SSH Connection Protocol specification.
AI is thinking...
5. Define a conection state in SSL. How Alert Protocol is used to convey SSL-related alerts to the peer entity in SSL connection?
AI is thinking...
6. What type of vulnerability ensure of cyber security? List the types of SSL protocols.
AI is thinking...
7. What does IP security policy means? Why does ESP include a padding field?
AI is thinking...
6. What do you mean by secure shell(SSH)? Explain.
AI is thinking...
6. How accidental and maliclous associations can be threats to wireless networks. Describe the approaches to provide WAP End-to-End Security.
AI is thinking...
5. What do you mean by transport-level security? Explain with example.
AI is thinking...
6. Why variable padding length is used in TLS? In SSH, how User Authentication Protocol authenticates clients.
AI is thinking...
8. Define public key certificate. List the requirements for the use of public key certificate scheme.
AI is thinking...
7. Explain the wireless transport layer security with example.
AI is thinking...
7. Discuss IEEE 802.11i phases of operation?
AI is thinking...
7. What services are defined under IEEE 802.11i RSN security specification? Discuss to IEEE 802.11i phases of operation for Authentication and Association.
AI is thinking...
8. What functionalities PGP provides for mail security? How PGP ensures confidentiality and authentication services?
AI is thinking...
9. What are web security issues? Describe remote user authentication principles.
AI is thinking...
8. How can you secure the electronic mail? Explain with example.
AI is thinking...
8. How PGP provides E-mail compatibility feature? What is the use of S/MIME?
AI is thinking...
9.Differentiate between Transport and Tunnel Mode. Briefly describe the fields of an Encapsulating Security Payload (ESP) packet.
AI is thinking...
10. Write short notes on(Any Two)
a. DKIM
b. Transport mode and tunnel mode
c. Secure Shell(SSH)
AI is thinking...
9. Explain benefits of using IPsec. How IPSec Protocol processes outbound packets?
AI is thinking...
9. What do you mean by IP security? Explain IP security in brief.
AI is thinking...
10. Differentiate between security Attacks and security services.
AI is thinking...
10. What is cyber crime? Discuss various kinds of cyber crime attacks.
AI is thinking...
10. Define cyber security and cyber war.
AI is thinking...
11. Explain in brief about Cyber security.
AI is thinking...
11. Discuss OSI security Architecture.
AI is thinking...
2. Explain the model for Network Security.
AI is thinking...