SIC- Question Bank 3

download SIC- Question Bank 3

of 6

description

questions of security in computing

Transcript of SIC- Question Bank 3

Doc. No. sngce/cse/fm/qb/14-15/cs010 803

Doc. No. sngce/cse/fm/qb/16/cs010 803

Rev: 2Sree Narayana Gurukulam College of Engineering,

Kadayiruppu2016

Department of Computer Science and Engineering

QUESTION BANK

(Including all questions from previous 5 years University Exams)

Semester : 8

Sub Name & Code: CS010 803 Security in Computing

Faculty: Vidhya P.M QUESTION BANK

2015-2016

Sub Name & Code: CS010 803 Security in ComputingModule 1

1. Explain the different Aspects of Security.?

2. What is meant by Network Security?3. What you mean by Symmetric Cipher Model?

4. What are Poly alphabetic Ciphers?

5. Which are the different methods used to convert a plaintext to Ciphertext?6. State the difference between Authentication and Confidentiality?7. State the drawbacks between symmetric and Asymmetric Encryption Scheme?8. Define Cryptography.9. What are security services?

10. List out some security mechanisms.11. What is Cipher? Explain.12. What is Caesar substitution?13. Explain Encryption and Decryption.

14. Define Authentication.15. What is the need for Network security?16. Write the need for encryption and decryption.17. What is a Rail Fence Cipher?18. Write short notes on Row Transposition Cipher.19. Briefly describe about the different security attacks.20. Explain Substitution Techniques for Cipher Text generation?21. Explain different aspects of network security

22. Explain the different types of attacks, in detail.

23. Write a note on security services and mechanisms.24. Explain the concept of Cryptography.25. Write a note on classical encryption techniques.26. Briefly describe the different security services and the different security mechanisms.27. Write short notes on Caesar Cipher and Playfair Cipher.Module 2

1. What are the criteria for S-box design in DES and its functioning?2. Describe Avalanche Effect.3. State the security approaches of RSA4. Give the ingredients of a Public Key Cryptosystem.5. Give brief description about the design features of Feistel Network6. Compare RSA and DES algorithms.7. Explain the concept of Cryptography.8. What is meant by Block Cipher?9. Diferentiate between Stream Cipher and Block Cipher.

10. What are Public Key Cryptosystems? Explain the need and working of RSA Algorithm.11. How can we provide Secrecy and Authentication in a Public Key Cryptosystem, as separately and as together?12. What you mean by Data Encryption Standard? Explain its Characteristics and Components.

13. Explain the RSA Algorithm in detail. Compare RSA algorithm with DES algorithm14. What are Feistel Ciphers? Explain Encryption and Decryption using Feistel Ciphers.

15. What you mean by Data Encryption Standard? Explain its Characteristics and Components.16. Explain DES algorithm. Discuss the strength and weakness of DES algorithm.17. Explain RSA algorithm. Discuss the three possible approaches to attack RSA algorithm

18. Explain the Important features of modern symmetric key algorithms. 19. Explain the Diffie Hellman key exchange method.20. Discuss the strengths and weakness of DES algorithm.21. Explain the elliptic curve cryptography.22. State Eulers and Formats theorem with proof.23. Summarize on Modern Block Ciphers.24. Elaborate the principles of Public Key Cryptography Systems. Module 31. What are Kerberos?

2. What is Authentication?3. State the drawbacks of Direct Digital Signatures.4. Give the difference between Kerberos Version-4 and Version-5.

5. What is a Digital Signature? Give its properties

6. Define hash function7. Define functions of MAC.8. Explain digital certificates.9. What are Digital Signatures? Explain its classification and properties in detail.10. Explain the use of different versions of Kerberos in detail.

11. Explain briefly the X-509 authentication service12. Explain the functioning of Kerberos server.13. Explain the importance of Hash functions.14. Explain the requirements and different approaches for the digital signature function.15. Explain Secure Hash Algorithm with overall processing of a message to produce a message digest.

16. Explain MD 5 algorithm with overall processing of a message to produce a message digest.

17. Explain each of the two types of Digital Signature. Also explain the Digital Signature Algorithm and the Digital Signature System.

18. Describe the Digital Signature Standards.

19. Illustrate Hash functions with example.

20. Discuss the overview of Kerberos. Explain Simple Authentication Dialogue and more secure Authentication Dialogue in Kerberos Version 4.

Module 4

1. What are firewalls?

2. Explain the features of secure socket layer.3. List the design goals for a firewall.4. Explain benefits of IPSec.5. Write the main concepts on Pretty Good Privacy.6. Explain Application-level gateway and circuit level gateway.

7. Briefly describe the IP Security Architecture.8. Explain, with an example, E-mail security.9. Explain briefly S/MIME.10. Explain secure socket layer architecture briefly.

11. How do firewalls help to achieve security? Discuss their limitations.

12. Describe briefly about Secure Electronic Transaction.13. Explain briefly PGP and its services14. What are Transport mode and Tunnel mode authentication in IP? Explain. How ESP is applied to both these modes.15. Draw the IP Security Authentication Header and explain the functions of each field.Module 5

1. What is a Virus?2. Define OS Security.3. What are the common intrusion techniques?4. Explain the terms Threats, Vulnerabilities and Attacks.

5. Explain Memory and Address Protection in OS.6. Define the models of Security.7. Briefly discuss virus countermeasures .8. Explain Bell-La Padula confidentiality model.9. Explain the various protection mechanisms for OS. Also specify the different levels of security.10. What are various Intrusion Detection techniques.

11. Explain memory address protection meachanism in operating system security

12. Brielfy discuss the different models of security.

13. Briefly describe file protection mechanism.

14. What are viruses? Explain the virus related threats and the counter measures applied.

15. Describe in detail about Password Management.2Signature:

Faculty: Vidhya P.M

HOD: Prof. P Jayakumar