20 Apr 2015

Network Security Question Bank

Network Security Question Bank

Network Security Question Bank For MCA, BCA, PGDCA Students

 

Unit-1

Answer the following questions in brief

1)    List few examples of software attack
2)    What are the essential ingredients of a symmetric cipher.
3)    Why is the middle portion of 3DES a decryption rather than an encryption.
4)    What is the difference between block cipher and stream cipher?
5)    What is digital signature?
6)    Differentiate symmetric and asymmetric cipher
7)    What is Replay attack?
8)    What do you understand by cryptanalysis?
9)    What is the use of traffic padding?

Answer the following questions in detail

1)    What is the OSI security architecture?
2)    List and briefly define categories of passive and active security attacks?
3)    Explain the network security model
4)    Describe in brief, the basic steps performed in DES? Comment on the strength of the DES
         scheme.
5)    Compare DES, 3DES, and AES.
6)    What is the difference between authentication & non-repudiation?
7)    What is a replay attack? Explain with an example. Discuss its consequences.   
8)    List out and explain steps followed in symmetric encryption
9)    What is the transport layer security?
10)  What is the difference between link and end-to-end encryption?

Unit II

Answer the following questions in brief

1)    List three approaches to message authentication.
2)    How is MAC different from HMAC?
3)    List and briefly define three uses of a public-key cryptosystem
4)    What is a digital signature?
5)    What is a public-key certificate?
6)    Explain different Crypto algorithms where public-key cryptosystems are used.
7)    What is the role of session key in public key schemes?
8)    List the properties a digital signature should possess?
9)    Mention the scenario where kerberos scheme is preferred
10)  What are the technical deficiencies in the kerberos version 4 protocol?
11)  What is the difference between a session key and master key.
12)  In the context of Kerberos, what is a realm?
13)  Why session keys are required? What are the advantages?
14)  List different authentication procedures in X.509 certificate.
15)  What are the different management functions of PKIX?
16)  How is an X.509 certificate revoked?

  Answer the following in detail

1)   What are the principal differences between version 4 and version 5 of Kerberos ?
2)   Write a note on: Kerberos authentication service
3)   Explain key generation, encryption, and decryption in the RSA algorithm. Perform  encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
4)   List different ticket flags of Kerberos version 5.
5)   Discuss basic requirements for Kerberos services.
6)   What are the requirements for a Hash function?
7)   State some typical situations where public key techniques can be used effectively.
8)   Compare the distinct features of SHA-1 and MD-5 algorithms.
9)   State the advantages of using Cipher Block Chaining (CBC) mode over Electronic Code Book (ECB) mode.
10) Explain the Diffe-Hellman algorithm for establishing a shared secret over an unprotected communication channel. Provide an example to illustrate the working of this algorithm.
11) Explain the steps involve in overall processing of a message to produce a message digest in Secure Hash Algorithm with appropriate diagrams.
12) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
13) How are public-key certificates generated in X.509 authentication service? What do you understand by forward and reverse certificates in X.509?
14) What is public key infrastructure? Briefly explain the purposes and functions of a public key infrastructure (PKI) in cryptography.

Unit III and Unit IV

Answer the following questions in brief


1)   What are the five principal services provided by PGP?
2)   Why does PGP generate signature before applying compression?
3)   What is Radix-64 conversion? How is it used for an e-mail application?
4)   Why is the segmentation and reassembly function in PGP needed?
5)   List different MIME content types
6)   What is S/MIME?
7)   What is a key ring in PGP?
8)   What is a clear signed message in S/MIME?
9)   How routers benefit from IPsec? Explain one benefit.
10) Differentiate between transport and tunnel mode in IPsec
11) What services are provided by IPSec.
12) What protocols comprise SSL.
13) What services are provided by the SSL Record Protocols.
14) What is a fingerprint in PGP system?
15) At which layer of OSI model the SSL (or TLS) protocol works?
16) What is the need of acquirer in SET?
17) Write the principle on which the Intrusion detection is based.
18) What is a honey pot?
19) Key legitimacy field (w.r.t. PGP)

Answer the following in detail

1)    How is Authentication achieved in Pretty Good Privacy?
2)    Compare and contrast S-MIME and PGP protocols.
3)    What is a Secure Electronic Transaction (SET) and why is it failed to win market share as a credit card approved standard?
4)     Compare and contrast between SSL and SET?
5)     Discuss the various components of IPSec architecture. What is anti replay mechanism in context of IPSec?
6)    What is S/MIME and how does it works? Briefly explain.
7)    What are the advantages of SET protocol?
8)    Discuss five benefits of IPSec as a security protocol.
9)    What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
10)    How PGP constructs a secure mail? Write the steps involved in the process.
11)    How enveloped data is constructed in S/MIME. Write all steps for the same
12)    Show what ISAKMP proposal, transfer and notification payloads are used for
13)    Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication
data field.
14)     What does the ChagneCipherSpec protocol do?
15)     What is the need of pseudo random function used in TLS?
16)      Differentiate between profile based and threshold detection methods of
statistical anomaly detection

Unit V

Answer the following questions in brief

1)    What is default discard policy in firewalls
2)    What is dual home bastion in firewall configuration?
3)    Write two rules needed for multilevel trusted systems
4)    What is a protection profile in common criteria for Information security
evaluation?
5)    Stateful firewall
6)    Between default discard and default accept policy in packet filtering firewalls, which one is better and why?

 Answer the following in detail

1)    Write down at least 7 characteristics of a bastion host and explain their
need with an example.
2)    What is the difference between a packet-filtering router and a stateful inspection firewall?
3)    Discuss different types of Firewalls
4)    Discus the techniques used by firewalls to control access and enforce a
security policy.
5)    Discuss the common criteria for Information Technology Security Evaluation
6)    Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done.

3 Mar 2015

How to Make your site Responsive on all screens


ittechnocrates - How To Make Website Reponsive on all Screens



 Hello There!

CSS stands for Cascading Style Sheet. It makes all the designing of your website. You have just to do is to make your webpage design responsive to all screen through these .css files. When I am developing a site, I thought may it be responsive for all screens? does my visitor can see it in his/her tab or mobile? So I gone through some sites and find some effective methods for solving the responsiveness problems of any site.

The Screen option:-

 You can provide the screen option in the starting of any HTML landing page. This screen option let you specify which screen you have and according to your selection it will give you the webpage.
This will cause you multiple CSS files which have the designing of separate screen in separate file.

Pros and cons:

  (1) Fix Screen size and nothing complex for pixels. Each screen have its own css.
  (2) Have to make separate Screen CSS for Each screen.

The Media Queries:-

You can develop any website's design with CSS. Media queries are the best fit method for this. This will make one style sheet which helps you to create design for diffrent screens in one file... No need to make different different files for each screen. they adjust classes as they have to through viewport. you just have to specify link tag that contains attributes like "viewport=1366px" and "media=all".

pros and cons:
(1) Best Effective and convincing method. Just define the screen you want in media query.
(2) More Complex if two or more CSS are conflicting with each other.

20 Feb 2015

How to Upgrade From Windows 7,8 to Windows 10

http://www.itdesc.in/2015/02/how-to-upgrade-windows.html

 How to Upgrade to Windows 10?

In this post I would like to describe how to upgrade your windows 8 system to windows 10.
This will require some steps to upgrade. The upgrade or we can say upgrade procedure will require following requirements.

They are as under:

Requirements for Upgrade Process:

(1) You will need a licensed version of windows 7,8.
(2) Access privileges of computer as an administrator.
(3) A Stable Internet Connection with high data transfer capacity.
(4) At least 4GB ram for 64bit PC and 2GB for 32bit PC.
(5) Some time to spare for windows update process.

  Steps for Upgrade/Update Procedure:

for Windows 7 Users:

  1. Click on Windows Button which is at left Bottom side at your screen with windows logo.
  2. Go to Control Panel Option and click on it.
  3. Find the Windows Update option and click on it.
  4. Click on button which shows "Check available Update."
  5. Now find All updates of Windows 10.(generally shows "windows 10" in messages.
  6. select all the process which are found and click on update.
  7. Wait for update/upgrade procedure to complete.
  8. After complete the update, you will asked to restart, So Restart the pc and Have fun with Windows 10.

for windows 8 Users:

  1. Press windows key + x, Then press P (shortcut to Control Panel) or search for Control Panel.
  2. Find the Windows Update option and click on it.
  3. Click on button which shows "Check available Update."
  4. Now find All updates of Windows 10.(generally shows "windows 10" in messages.
  5. select all the process which are found and click on update.
  6. Wait for update/upgrade procedure to complete.
  7. After complete the update, you will asked to restart, So Restart the pc and Have fun with Windows 10.
 Don't forget to Like, share and Comment if you like the Post.


 

1 Jan 2015

Memory Overload Error in Bluestacks? Find Solution Here


ittechnocrates.blogspot.com-Memory Overload Error in Bluestacks? Find Solution Here.


  •  Do your Bluestacks saying your memory is Full?
  •  Do Your Whatsapp in Bluestacks can't Download any content?
  • What is There in Blue Stacks loses your mind?

Here is The Solution of it:

Steps:
1.    Download APK file from Here.. Click To Download.

2.    Install the File and open it in bluestack after installation.

3.    Move Down.

4.    Then click on Whatsapp Folder.

5.    Click on Each folder and decide what to store and what not.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps
6.    If you want to move it from blustack to pc then cut or copy it and move to a new folder.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

7.    Then cut this folder and move it to the windows folder which is located besides whatsapp folder
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

8.    Paste that folder in public documents.
     
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps

9.    It will shown here.
ittechnocrates.blogspot.com-Blue Stacks Error Solving Steps


Comments

© 2013-2016 ITTechnocrates. All rights resevered. Developed by Bhavya Mehta