Network Security Question Bank
Unit-1
Answer the following questions in brief
1) List few examples of software attack
2) What are the essential ingredients of a symmetric cipher.
3) Why is the middle portion of 3DES a decryption rather than an encryption.
4) What is the difference between block cipher and stream cipher?
5) What is digital signature?
6) Differentiate symmetric and asymmetric cipher
7) What is Replay attack?
8) What do you understand by cryptanalysis?
9) What is the use of traffic padding?
2) What are the essential ingredients of a symmetric cipher.
3) Why is the middle portion of 3DES a decryption rather than an encryption.
4) What is the difference between block cipher and stream cipher?
5) What is digital signature?
6) Differentiate symmetric and asymmetric cipher
7) What is Replay attack?
8) What do you understand by cryptanalysis?
9) What is the use of traffic padding?
Answer the following questions in detail
1) What is the OSI security architecture?
2) List and briefly define categories of passive and active security attacks?
3) Explain the network security model
4) Describe in brief, the basic steps performed in DES? Comment on the strength of the DES
scheme.
5) Compare DES, 3DES, and AES.
6) What is the difference between authentication & non-repudiation?
7) What is a replay attack? Explain with an example. Discuss its consequences.
8) List out and explain steps followed in symmetric encryption
9) What is the transport layer security?
10) What is the difference between link and end-to-end encryption?
1) What are the five principal services provided by PGP?
2) Why does PGP generate signature before applying compression?
3) What is Radix-64 conversion? How is it used for an e-mail application?
4) Why is the segmentation and reassembly function in PGP needed?
5) List different MIME content types
6) What is S/MIME?
7) What is a key ring in PGP?
8) What is a clear signed message in S/MIME?
9) How routers benefit from IPsec? Explain one benefit.
10) Differentiate between transport and tunnel mode in IPsec
11) What services are provided by IPSec.
12) What protocols comprise SSL.
13) What services are provided by the SSL Record Protocols.
14) What is a fingerprint in PGP system?
15) At which layer of OSI model the SSL (or TLS) protocol works?
16) What is the need of acquirer in SET?
17) Write the principle on which the Intrusion detection is based.
18) What is a honey pot?
19) Key legitimacy field (w.r.t. PGP)
2) List and briefly define categories of passive and active security attacks?
3) Explain the network security model
4) Describe in brief, the basic steps performed in DES? Comment on the strength of the DES
scheme.
5) Compare DES, 3DES, and AES.
6) What is the difference between authentication & non-repudiation?
7) What is a replay attack? Explain with an example. Discuss its consequences.
8) List out and explain steps followed in symmetric encryption
9) What is the transport layer security?
10) What is the difference between link and end-to-end encryption?
Unit II
Answer the following questions in brief
1) List three approaches to message authentication.
2) How is MAC different from HMAC?
3) List and briefly define three uses of a public-key cryptosystem
4) What is a digital signature?
5) What is a public-key certificate?
6) Explain different Crypto algorithms where public-key cryptosystems are used.
7) What is the role of session key in public key schemes?
8) List the properties a digital signature should possess?
9) Mention the scenario where kerberos scheme is preferred
10) What are the technical deficiencies in the kerberos version 4 protocol?
11) What is the difference between a session key and master key.
12) In the context of Kerberos, what is a realm?
13) Why session keys are required? What are the advantages?
14) List different authentication procedures in X.509 certificate.
15) What are the different management functions of PKIX?
16) How is an X.509 certificate revoked?
2) How is MAC different from HMAC?
3) List and briefly define three uses of a public-key cryptosystem
4) What is a digital signature?
5) What is a public-key certificate?
6) Explain different Crypto algorithms where public-key cryptosystems are used.
7) What is the role of session key in public key schemes?
8) List the properties a digital signature should possess?
9) Mention the scenario where kerberos scheme is preferred
10) What are the technical deficiencies in the kerberos version 4 protocol?
11) What is the difference between a session key and master key.
12) In the context of Kerberos, what is a realm?
13) Why session keys are required? What are the advantages?
14) List different authentication procedures in X.509 certificate.
15) What are the different management functions of PKIX?
16) How is an X.509 certificate revoked?
Answer the following in detail
1) What are the principal differences between version 4 and version 5 of Kerberos ?
2) Write a note on: Kerberos authentication service
3) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
4) List different ticket flags of Kerberos version 5.
5) Discuss basic requirements for Kerberos services.
6) What are the requirements for a Hash function?
7) State some typical situations where public key techniques can be used effectively.
8) Compare the distinct features of SHA-1 and MD-5 algorithms.
9) State the advantages of using Cipher Block Chaining (CBC) mode over Electronic Code Book (ECB) mode.
10) Explain the Diffe-Hellman algorithm for establishing a shared secret over an unprotected communication channel. Provide an example to illustrate the working of this algorithm.
11) Explain the steps involve in overall processing of a message to produce a message digest in Secure Hash Algorithm with appropriate diagrams.
12) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
13) How are public-key certificates generated in X.509 authentication service? What do you understand by forward and reverse certificates in X.509?
14) What is public key infrastructure? Briefly explain the purposes and functions of a public key infrastructure (PKI) in cryptography.
2) Write a note on: Kerberos authentication service
3) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
4) List different ticket flags of Kerberos version 5.
5) Discuss basic requirements for Kerberos services.
6) What are the requirements for a Hash function?
7) State some typical situations where public key techniques can be used effectively.
8) Compare the distinct features of SHA-1 and MD-5 algorithms.
9) State the advantages of using Cipher Block Chaining (CBC) mode over Electronic Code Book (ECB) mode.
10) Explain the Diffe-Hellman algorithm for establishing a shared secret over an unprotected communication channel. Provide an example to illustrate the working of this algorithm.
11) Explain the steps involve in overall processing of a message to produce a message digest in Secure Hash Algorithm with appropriate diagrams.
12) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
13) How are public-key certificates generated in X.509 authentication service? What do you understand by forward and reverse certificates in X.509?
14) What is public key infrastructure? Briefly explain the purposes and functions of a public key infrastructure (PKI) in cryptography.
Unit III and Unit IV
Answer the following questions in brief
1) What are the five principal services provided by PGP?
2) Why does PGP generate signature before applying compression?
3) What is Radix-64 conversion? How is it used for an e-mail application?
4) Why is the segmentation and reassembly function in PGP needed?
5) List different MIME content types
6) What is S/MIME?
7) What is a key ring in PGP?
8) What is a clear signed message in S/MIME?
9) How routers benefit from IPsec? Explain one benefit.
10) Differentiate between transport and tunnel mode in IPsec
11) What services are provided by IPSec.
12) What protocols comprise SSL.
13) What services are provided by the SSL Record Protocols.
14) What is a fingerprint in PGP system?
15) At which layer of OSI model the SSL (or TLS) protocol works?
16) What is the need of acquirer in SET?
17) Write the principle on which the Intrusion detection is based.
18) What is a honey pot?
19) Key legitimacy field (w.r.t. PGP)
Answer the following in detail
1) How is Authentication achieved in Pretty Good Privacy?
2) Compare and contrast S-MIME and PGP protocols.
3) What is a Secure Electronic Transaction (SET) and why is it failed to win market share as a credit card approved standard?
4) Compare and contrast between SSL and SET?
5) Discuss the various components of IPSec architecture. What is anti replay mechanism in context of IPSec?
6) What is S/MIME and how does it works? Briefly explain.
7) What are the advantages of SET protocol?
8) Discuss five benefits of IPSec as a security protocol.
9) What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
10) How PGP constructs a secure mail? Write the steps involved in the process.
11) How enveloped data is constructed in S/MIME. Write all steps for the same
12) Show what ISAKMP proposal, transfer and notification payloads are used for
13) Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication
data field.
14) What does the ChagneCipherSpec protocol do?
15) What is the need of pseudo random function used in TLS?
16) Differentiate between profile based and threshold detection methods of
statistical anomaly detection
2) Compare and contrast S-MIME and PGP protocols.
3) What is a Secure Electronic Transaction (SET) and why is it failed to win market share as a credit card approved standard?
4) Compare and contrast between SSL and SET?
5) Discuss the various components of IPSec architecture. What is anti replay mechanism in context of IPSec?
6) What is S/MIME and how does it works? Briefly explain.
7) What are the advantages of SET protocol?
8) Discuss five benefits of IPSec as a security protocol.
9) What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
10) How PGP constructs a secure mail? Write the steps involved in the process.
11) How enveloped data is constructed in S/MIME. Write all steps for the same
12) Show what ISAKMP proposal, transfer and notification payloads are used for
13) Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication
data field.
14) What does the ChagneCipherSpec protocol do?
15) What is the need of pseudo random function used in TLS?
16) Differentiate between profile based and threshold detection methods of
statistical anomaly detection
Unit V
Answer the following questions in brief
1) What is default discard policy in firewalls
2) What is dual home bastion in firewall configuration?
3) Write two rules needed for multilevel trusted systems
4) What is a protection profile in common criteria for Information security
evaluation?
5) Stateful firewall
6) Between default discard and default accept policy in packet filtering firewalls, which one is better and why?
2) What is dual home bastion in firewall configuration?
3) Write two rules needed for multilevel trusted systems
4) What is a protection profile in common criteria for Information security
evaluation?
5) Stateful firewall
6) Between default discard and default accept policy in packet filtering firewalls, which one is better and why?
Answer the following in detail
1) Write down at least 7 characteristics of a bastion host and explain their
need with an example.
2) What is the difference between a packet-filtering router and a stateful inspection firewall?
3) Discuss different types of Firewalls
4) Discus the techniques used by firewalls to control access and enforce a
security policy.
5) Discuss the common criteria for Information Technology Security Evaluation
6) Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done.
need with an example.
2) What is the difference between a packet-filtering router and a stateful inspection firewall?
3) Discuss different types of Firewalls
4) Discus the techniques used by firewalls to control access and enforce a
security policy.
5) Discuss the common criteria for Information Technology Security Evaluation
6) Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done.










About
Tags
Popular

