41 questions

1. Define passive attack and active attack. Explain the OSI security architecture.

asked in 2078

2. What are the disadvantages of asymmetric cryptography ? Describe the components of Public Key Infrastructure.

asked in 2078

1. What is nonrepudiation of origin? How connection confidentiality differs from connectionless confidentlity?

asked in 2075

1. How can you differentiate data integrity from system integrity? Briefly discuss the catagories of security services.

asked in 2074

1. Explain the basic computer security with example.

asked in 2072

3. What are the principle differences between version 4 and version 5 of Kerberos? Differentiate between pre-shared key and extensible authentication protocol for authenticating devices onto a wireless networks.

asked in 2078

2. What is the use of master (permanent) keys in security? Write a protocol to share public keys using public-key authority scheme.

asked in 2074

2. What is the role of CRL issuer in public key infrastructure? How revocation request and cross certification functions are executed in PXIX?

asked in 2075

4. Explain different services provided by PGP.

asked in 2078

3. What do you mean by reply attack? Discuss the roles of Authenticating Server and Ticket Granting Server in Kerberos protocol.

asked in 2074

3. Assume an open distributed network environment in which users at workstations wish to access services on servers distributed throughout the network. Now discuss how you can use Kerberos protocol for secured service communication between users and servers in the environment.

asked in 2075

3. Explain the distribution of public keys with practical example.

asked in 2072

5. Explain the principle categories of SET participants.

asked in 2078

4. What basic security services do the SSL Record Protocol provides for SSL Connections? Mention details of the operations that the SSL Record Protocol executes for ensuring the basic security services.

asked in 2074

4. What is the use of identity in network security? Describe the principal elements of an identify management system.

asked in 2075

4. Explain the user authentication principles with example.

asked in 2072

6. What type of vulnerability ensure of cyber security? List the types of SSL protocols.

asked in 2078

5. What do you mean by local forwarding in SSH? Describe about the possible channel types recognized in SSH Connection Protocol specification.

asked in 2074

5. Define a conection state in SSL. How Alert Protocol is used to convey SSL-related alerts to the peer entity in SSL connection?

asked in 2075

7. What does IP security policy means? Why does ESP include a padding field?

asked in 2078

6. How accidental and maliclous associations can be threats to wireless networks. Describe the approaches to provide WAP End-to-End Security.

asked in 2074

6. Why variable padding length is used in TLS? In SSH, how User Authentication Protocol authenticates clients.

asked in 2075

5. What do you mean by transport-level security? Explain with example.

asked in 2072

6. What do you mean by secure shell(SSH)? Explain.

asked in 2072

8. Define public key certificate. List the requirements for the use of public key certificate scheme.

asked in 2078

7. What services are defined under IEEE 802.11i RSN security specification? Discuss to IEEE 802.11i phases of operation for Authentication and Association.

asked in 2074

7. Discuss IEEE 802.11i phases of operation?

asked in 2075

7. Explain the wireless transport layer security with example.

asked in 2072

9. What are web security issues? Describe remote user authentication principles.

asked in 2078

8. What functionalities PGP provides for mail security? How PGP ensures confidentiality and authentication services?

asked in 2074

8. How PGP provides E-mail compatibility feature? What is the use of S/MIME?

asked in 2075

8. How can you secure the electronic mail? Explain with example. 

asked in 2072

10. Write short notes on(Any Two)

a. DKIM

b. Transport mode and tunnel mode

c. Secure Shell(SSH)

asked in 2078

9.Differentiate between Transport and Tunnel Mode. Briefly describe the fields of an Encapsulating Security Payload (ESP) packet.

asked in 2074

9. Explain benefits of using IPsec. How IPSec Protocol processes outbound packets?

asked in 2075

9. What do you mean by IP security? Explain IP security in brief.

asked in 2072

10. Define cyber security and cyber war.

asked in 2074

10. What is cyber crime? Discuss various kinds of cyber crime attacks.

asked in 2075

10. Differentiate between security Attacks and security services.

asked in 2072

11. Discuss OSI security Architecture.

asked in 2074

11. Explain in brief about Cyber security.

asked in 2072

1 questions

2. Explain the model for Network Security.

asked in 2072

questions
questions
questions
questions
questions
questions