Showing posts with label Computer Networking. Show all posts
Showing posts with label Computer Networking. Show all posts

20 Apr 2015

Network Security Question Bank

Network Security Question Bank

Network Security Question Bank For MCA, BCA, PGDCA Students

 

Unit-1

Answer the following questions in brief

1)    List few examples of software attack
2)    What are the essential ingredients of a symmetric cipher.
3)    Why is the middle portion of 3DES a decryption rather than an encryption.
4)    What is the difference between block cipher and stream cipher?
5)    What is digital signature?
6)    Differentiate symmetric and asymmetric cipher
7)    What is Replay attack?
8)    What do you understand by cryptanalysis?
9)    What is the use of traffic padding?

Answer the following questions in detail

1)    What is the OSI security architecture?
2)    List and briefly define categories of passive and active security attacks?
3)    Explain the network security model
4)    Describe in brief, the basic steps performed in DES? Comment on the strength of the DES
         scheme.
5)    Compare DES, 3DES, and AES.
6)    What is the difference between authentication & non-repudiation?
7)    What is a replay attack? Explain with an example. Discuss its consequences.   
8)    List out and explain steps followed in symmetric encryption
9)    What is the transport layer security?
10)  What is the difference between link and end-to-end encryption?

Unit II

Answer the following questions in brief

1)    List three approaches to message authentication.
2)    How is MAC different from HMAC?
3)    List and briefly define three uses of a public-key cryptosystem
4)    What is a digital signature?
5)    What is a public-key certificate?
6)    Explain different Crypto algorithms where public-key cryptosystems are used.
7)    What is the role of session key in public key schemes?
8)    List the properties a digital signature should possess?
9)    Mention the scenario where kerberos scheme is preferred
10)  What are the technical deficiencies in the kerberos version 4 protocol?
11)  What is the difference between a session key and master key.
12)  In the context of Kerberos, what is a realm?
13)  Why session keys are required? What are the advantages?
14)  List different authentication procedures in X.509 certificate.
15)  What are the different management functions of PKIX?
16)  How is an X.509 certificate revoked?

  Answer the following in detail

1)   What are the principal differences between version 4 and version 5 of Kerberos ?
2)   Write a note on: Kerberos authentication service
3)   Explain key generation, encryption, and decryption in the RSA algorithm. Perform  encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
4)   List different ticket flags of Kerberos version 5.
5)   Discuss basic requirements for Kerberos services.
6)   What are the requirements for a Hash function?
7)   State some typical situations where public key techniques can be used effectively.
8)   Compare the distinct features of SHA-1 and MD-5 algorithms.
9)   State the advantages of using Cipher Block Chaining (CBC) mode over Electronic Code Book (ECB) mode.
10) Explain the Diffe-Hellman algorithm for establishing a shared secret over an unprotected communication channel. Provide an example to illustrate the working of this algorithm.
11) Explain the steps involve in overall processing of a message to produce a message digest in Secure Hash Algorithm with appropriate diagrams.
12) Explain key generation, encryption, and decryption in the RSA algorithm. Perform encryption and decryption using the following parameters: p=7, q=11, e=17 and M=8?
13) How are public-key certificates generated in X.509 authentication service? What do you understand by forward and reverse certificates in X.509?
14) What is public key infrastructure? Briefly explain the purposes and functions of a public key infrastructure (PKI) in cryptography.

Unit III and Unit IV

Answer the following questions in brief


1)   What are the five principal services provided by PGP?
2)   Why does PGP generate signature before applying compression?
3)   What is Radix-64 conversion? How is it used for an e-mail application?
4)   Why is the segmentation and reassembly function in PGP needed?
5)   List different MIME content types
6)   What is S/MIME?
7)   What is a key ring in PGP?
8)   What is a clear signed message in S/MIME?
9)   How routers benefit from IPsec? Explain one benefit.
10) Differentiate between transport and tunnel mode in IPsec
11) What services are provided by IPSec.
12) What protocols comprise SSL.
13) What services are provided by the SSL Record Protocols.
14) What is a fingerprint in PGP system?
15) At which layer of OSI model the SSL (or TLS) protocol works?
16) What is the need of acquirer in SET?
17) Write the principle on which the Intrusion detection is based.
18) What is a honey pot?
19) Key legitimacy field (w.r.t. PGP)

Answer the following in detail

1)    How is Authentication achieved in Pretty Good Privacy?
2)    Compare and contrast S-MIME and PGP protocols.
3)    What is a Secure Electronic Transaction (SET) and why is it failed to win market share as a credit card approved standard?
4)     Compare and contrast between SSL and SET?
5)     Discuss the various components of IPSec architecture. What is anti replay mechanism in context of IPSec?
6)    What is S/MIME and how does it works? Briefly explain.
7)    What are the advantages of SET protocol?
8)    Discuss five benefits of IPSec as a security protocol.
9)    What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
10)    How PGP constructs a secure mail? Write the steps involved in the process.
11)    How enveloped data is constructed in S/MIME. Write all steps for the same
12)    Show what ISAKMP proposal, transfer and notification payloads are used for
13)    Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication
data field.
14)     What does the ChagneCipherSpec protocol do?
15)     What is the need of pseudo random function used in TLS?
16)      Differentiate between profile based and threshold detection methods of
statistical anomaly detection

Unit V

Answer the following questions in brief

1)    What is default discard policy in firewalls
2)    What is dual home bastion in firewall configuration?
3)    Write two rules needed for multilevel trusted systems
4)    What is a protection profile in common criteria for Information security
evaluation?
5)    Stateful firewall
6)    Between default discard and default accept policy in packet filtering firewalls, which one is better and why?

 Answer the following in detail

1)    Write down at least 7 characteristics of a bastion host and explain their
need with an example.
2)    What is the difference between a packet-filtering router and a stateful inspection firewall?
3)    Discuss different types of Firewalls
4)    Discus the techniques used by firewalls to control access and enforce a
security policy.
5)    Discuss the common criteria for Information Technology Security Evaluation
6)    Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done.

17 May 2014

FON Questions that you can refer....

Q.1 what is the purpose of MAC?
Q.2 list types of connection in classical Ethernet.
Q.3 which algorithm is use for retransmission in ALOHA.
Q.4 difference between ALOHA and EHTERNET.
Q.5 difference between PCF and DCF mode.
Q.6 difference between 802.11 and 802.16.
Q.7 hub v/s switch.
Q.8 what is solution for ALOHA?
Q.9 list types of connection in fast Ethernet.
Q.10 what is routing?
Q.11 static v/s dynamic routing algorithm
Q.12 what is congestion control?
Q.13 difference between congestion detection and avoidance.
Q.14 from which congestion control algorithm take decision?
Q.15 what is jitter?
Q.16 fullform of RED.
Q.17 give disadvantage of count to infinity problem.
Q.18 give solution for count to infinity problem.
Q.19 list step involved in link state routing.
Q.20 list duties of transport layer.
Q.21 define multiplexing.
Q.22 what is process level addressing?
Q.23 what is flow control?
Q.24 what is the use of probe signal in persist timer?
Q.25 difference between symmetric and asymmetric connection close.
Q.26 what is connection establishment timer?
Q.27 FTP v/s CUTE FTP.
Q.28 list short comings from transport layer.
Q.29 what is DNS?
Q.30 define domain name space.
Q.31 list advantages of hierarchy.
Q.32 draw diagram of iterative search and recursive search.
Q.33 give example of CNAME.
Q.34 list types of resource record.
Q.35 difference between pop3 and imap.
Q.36 list component of SMTP.
Q.37 what is the job of message transfer agent (MTA).
Q.38 what is MIME?

12 Apr 2014

Protocol 1 Program..


Protocol Programs for Networking In C Language:-



Protocol 1(Simplex Protocol):-

  1. It is used for One way sending and receiving technique.
  2. It doesn't have acknowledgement for sender.
  3. No correspondence between Sender and Receiver.

Assumption:-

  1. The channel is error-free.
  2.  The sender is sending from an infinite stream of data and the receiver continues to read what the sender is sending.
  3. The reciever is at least as fast as the sender, thus we ca run the show without flow control mechanism.
  4. the sender writes to pipe 1 which is named pipe already defined.
  5. The write operation is binding operation by default.

Files needed:-

Header Files :- stdio.h, fcntl.h,
sender.txt:- For having message(frames) to send...
sender.c :- Sender side functionality and coding...
receiver.c :- Receiver side functionality and coding...

Code to be typed in sender.c file:

 void main()

{

        char ch;

        char temp[63];

        int val = open("pipe1", O_WRONLY);

        FILE *fp = fopen("sender.txt","rw+");

        system("clear");

        while((ch=fgetc(fp))!=EOF)

        {

                  if (ch == ' ')

                 {

                         fscanf("%s",temp);

                         write(val, temp, sizeof(temp));

                  }

                  else

                 {

                         printf("%s\n",temp);

                         write(val, temp, sizeof(temp));

                  }

          }

                printf("%s\n",temp);

                write(val, temp, sizeof(temp));

                close(val);

                fclose(fp);

}

Code to be typed in Reciever.c file:

void main()

 {

        int val;

        char temp[100];

        FILE *fp=fopen("reciever.txt","rw+");

        system("clear");

        mkfifo("pipe1", 0666, 0);

        val = open("pipe1", O_RDONLY);

        printf("\nReceiving msg : \n");

       while(read(val, temp, sizeof(temp)))

        {
              printf ("%s\n", temp);
        }

}

Comments

© 2013-2016 ITTechnocrates. All rights resevered. Developed by Bhavya Mehta