Frequently Asked Questions In Information/Network Security

 Frequently Asked Questions and their weight-age

1. Briefly describe the security services. (8)

2. Explain classical encryption techniques(Steps involved in each encryption technique like Caesar cipher, playfair cipher, hill cipher, vigenere cipher, one time pad cipher, rail fence, etc)

3. Explain about steganography,transposition cipher.

4. Describe the key generation of DES and encryption algorithm(8/16)

5. Explain the various types of cryptographic functions with an example.

6. Explain AES structure

7. Describe the encryption / decryption of Simplified DES /DES (16)

8. RSA algorithm and test for primality (8/16)

9. Explain Elliptic curve cryptography . Explain about the modular arithmetic ,its properties and their uses in cryptographic techniques.

10. Explain the symmetric key cryptography and asymmetric key cryptography with an example.

11. Explain the various ways of distributing the public keys. (key management) (16)

12. Explain the various methods of producing an authenticaton. (16)

13. Write a note on hash function

14. Explain the requirements of digital signatures and also discuss how problems related to digital signaturea are taken care by an arbiter?

15. State the need for authentication protocols and explain any three of them

16. Describe MD5. Compare it with MD4

17. Describe SHA-1

18. Describe RIPEMD/ HMAC algorithms

19. Differentiate version 4 and version 5 of Kerberos. Explain the concept of Realm in kerberos

20. Describe about IP-Security

21. Describe Kerberos version 4. (16)

22. Describe the services provided by the PGP. (16)

23. Explain in detail, the Handshake protocol in secure socket layer. (16)

24. Differentiate SSL & TLS. (8)

25. Describe in detail, the payment processing of SET. (16)

26. Explain in detail the transport layer security protocol in detail. (16).

27. Briefly discuss about e-mail security

28. Explain the various types of firewall. (16)

29. Explain the different firewall configuration. (8)

30. Describe the various ways of combining the security associations. (8)

31. What is the role of Baston host in firewalls?

32. Explain the intrusion detection mechanism

33. Explain the cincept of password protection system

(a) (i) Explain RSA algorithm with an example. (8)

(ii) Write short notes on PEM and PGP. (8)

(b) (i) How does a client C communicate with a server S using Kerberos protocol?Explain. (6)

(ii) What are different types of digital certificate? Explain. (10)

14. (a) (i) Explain the architecture of secure socket layer. (4)

(ii) State and explain different types of firewall mechanisms available .(12)

(a) Draw the block diagram of single round of DES algorithm and explain the processing carried out in each block. (16)

(b) Describe the RSA algorithm and its key generation, encryption and decryption operations. (16)

15. (a) What are the capabilities, limitations and design goals of firewalls? (16)

(b) (i) What are the three types of approaches to providing web security? (9)

(ii) How does IPsec impact the routing architecture required for internet working? (7)

. (a) (i) Explain the conventional encryption process. (8)

(ii) State and explain the different approaches to message authentication. (3)

(iii) What are the requirements of public key cryptography? (5)

(b) (i) Why is PGP popular? Explain the services offered by PGP. (8)

(ii) How the RSA algorithm generates key? (4)

(iii) Explain the authentication dialogue in Kerberos. (4)

14. (a) (i) What are the limitations of firewalls? Explain. (6)

(ii) Person A wants to send a confidential e-mail M to person B. How? (10)

(b) (i) How does SSL work? Explain. (10)

(ii) Write an algorithm for sequence of events for transactions. (6)

280 thoughts on “Frequently Asked Questions In Information/Network Security

  1. Pingback: Google
  2. Pingback: 먹튀검증
  3. Pingback: curso online
  4. Pingback: cuckold porn
  5. Pingback: male bondage gear
  6. Pingback: weight bench
  7. Pingback: 네임드사다리
  8. Pingback: Jkssb Requirement
  9. Pingback: FIFA Coins
  10. Pingback: female vibrator
  11. Pingback: body wand massager
  12. Pingback: Detroit SEO
  13. Pingback: Detroit SEO
  14. Pingback: shmmovers.com
  15. Pingback: cursos gratuitos
  16. Pingback: dp cock ring
  17. Pingback: Porn
  18. Pingback: chwilówki
  19. Pingback: vibrato lesson
  20. Pingback: vedo gee slim
  21. Pingback: suction cup dildo
  22. Pingback: Porn City XXX
  23. Pingback: male p spot toys
  24. Pingback: real skin dildo
  25. Pingback: website
  26. Pingback: mail order brides
  27. Pingback: employee home
  28. Pingback: los angeles seo
  29. Pingback: teen porn
  30. Pingback: Sex Toys
  31. Pingback: male vacuum pump
  32. Pingback: Store
  33. Pingback: kegel balls
  34. Pingback: 188bet
  35. Pingback: fun88
  36. Pingback: app for laptop
  37. Pingback: max penis pump
  38. Pingback: rijpe vrouw
  39. Pingback: sexo ao vivo
  40. Pingback: beginner butt plug
  41. Pingback: enema bag
  42. Pingback: Babaria Zonnebrand
  43. Pingback: Opblaasband
  44. Pingback: Times of India
  45. Pingback: cursos gratuitos
  46. Pingback: gay dick
  47. Pingback: daniels sex toy
  48. Pingback: bunny vibrator
  49. Pingback: shemale dating
  50. Pingback: sexe webcam
  51. Pingback: webcambabes
  52. Pingback: anal sex toy
  53. Pingback: cyberskin dong
  54. Pingback: n15235 pcware
  55. Pingback: sex toys
  56. Pingback: male vacuum pump
  57. Pingback: weird sex toy
  58. Pingback: best panty vibe
  59. Pingback: gay douching
  60. Pingback: best wall dildo
  61. Pingback: Porn Land
  62. Pingback: anal training kit
  63. Pingback: easy to get loans
  64. Pingback: Kamagra Gold
  65. Pingback: dual pleasure ring
  66. Pingback: big jelly dildo
  67. Pingback: g gasm
  68. Pingback: sex games
  69. Pingback: pleasure panty
  70. Pingback: 15% minoxidil buy
  71. Pingback: satta matka
  72. Pingback: realistic vagina
  73. Pingback: bullet egg
  74. Pingback: best male stroker
  75. Pingback: dildo
  76. Pingback: vibrator
  77. Pingback: vagina dilator
  78. Pingback: backdoor plugs
  79. Pingback: porn city
  80. Pingback: pornland
  81. Pingback: dp cock ring
  82. Pingback: realistic stroker
  83. Pingback: cyberskin stroker
  84. Pingback: European
  85. Pingback: mens pleasure toys
  86. Pingback: vac u lock
  87. Pingback: naughty paddle
  88. Pingback: best vibrators
  89. Pingback: bondage gear
  90. Pingback: unboxing vibrator
  91. Pingback: wordpress brisbane
  92. Pingback: porn
  93. Pingback: suctioncupdildo
  94. Pingback: stocking lingerie
  95. Pingback: Julia Ann Porn
  96. Pingback: Pakistani Suits
  97. Pingback: Pentair Ichlor
  98. Pingback: sexboer
  99. Pingback: porno files
  100. Pingback: geile sex filmpjes
  101. Pingback: gratis films
  102. Pingback: pornofilmpjes
  103. Pingback: iptv e doctor
  104. Pingback: liteblue usps gov
  105. Pingback: cordless massager
  106. Pingback: neon slim dildo
  107. Pingback: beach
  108. Pingback: hundesnor
  109. Pingback: nipple suction
  110. Pingback: room tour vlog
  111. Pingback: onewalmart.com
  112. Pingback: japanese porn
  113. Pingback: Don Karl Juravin
  114. Pingback: type 1 diabetes
  115. Pingback: spolorm hund
  116. Pingback: bdsm
  117. Pingback: sex restraint toys
  118. Pingback: storeholidayhours
  119. Pingback: personal lubricant
  120. Pingback: finger vibrators
  121. Pingback: podcast
  122. Pingback: daftar idn poker
  123. Pingback: g spot stimulation
  124. Pingback: how to deep throat
  125. Pingback: judi maxbet
  126. Pingback: سکس خارجی
  127. Pingback: gay mesh underwear
  128. Pingback: sex toys gay
  129. Pingback: Away game tickets
  130. Pingback: dick ring
  131. Pingback: iraniporn
  132. Pingback: MIDE-676
  133. Pingback: xxx

Leave a Reply