Академический Документы
Профессиональный Документы
Культура Документы
sngce/cse/fm/qb/16/cs010 803
Rev: 2
QUESTION BANK
(Including all questions from previous 5 years University
Exams)
Semester
:8
Computing
1
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar
HOD:
QUESTION BANK
2015-2016
Sub Name & Code: CS010 803 Security in
Computing
Module 1
1. Explain the different Aspects of Security.?
2. What is meant by Network Security?
3. What you mean by Symmetric Cipher Model?
4. What are Poly alphabetic Ciphers?
5. Which are the different methods used to convert a plaintext to Ciphertext?
6. State the difference between Authentication and Confidentiality?
7. State the drawbacks between symmetric and Asymmetric Encryption Scheme?
8. Define Cryptography.
9. What are security services?
10. List out some security mechanisms.
11. What is Cipher? Explain.
12. What is Caesar substitution?
13. Explain Encryption and Decryption.
14. Define Authentication.
15. What is the need for Network security?
16. Write the need for encryption and decryption.
17. What is a Rail Fence Cipher?
18. Write short notes on Row Transposition Cipher.
2
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar
HOD:
Module 2
1. What are the criteria for S-box design in DES and its functioning?
2. Describe Avalanche Effect.
3. State the security approaches of RSA
4. Give the ingredients of a Public Key Cryptosystem.
5. Give brief description about the design features of Feistel Network
6. Compare RSA and DES algorithms.
7. Explain the concept of Cryptography.
8. What is meant by Block Cipher?
9. Diferentiate between Stream Cipher and Block Cipher.
10. What are Public Key Cryptosystems? Explain the need and working of RSA
Algorithm.
11. How can we provide Secrecy and Authentication in a Public Key Cryptosystem,
as separately and as together?
12. What you mean by Data Encryption Standard? Explain its Characteristics and
Components.
13. Explain the RSA Algorithm in detail. Compare RSA algorithm with DES
algorithm
3
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar
HOD:
14. What are Feistel Ciphers? Explain Encryption and Decryption using Feistel
Ciphers.
15. What you mean by Data Encryption Standard? Explain its Characteristics and
Components.
16. Explain DES algorithm. Discuss the strength and weakness of DES algorithm.
17. Explain RSA algorithm. Discuss the three possible approaches to attack RSA
algorithm
18. Explain the Important features of modern symmetric key algorithms.
19. Explain the Diffie Hellman key exchange method.
20. Discuss the strengths and weakness of DES algorithm.
21. Explain the elliptic curve cryptography.
22. State Eulers and Formats theorem with proof.
23. Summarize on Modern Block Ciphers.
24. Elaborate the principles of Public Key Cryptography Systems.
Module 3
1. What are Kerberos?
2. What is Authentication?
3. State the drawbacks of Direct Digital Signatures.
4. Give the difference between Kerberos Version-4 and Version-5.
5. What is a Digital Signature? Give its properties
HOD:
15. Explain Secure Hash Algorithm with overall processing of a message to produce a
message digest.
16. Explain MD 5 algorithm with overall processing of a message to produce a
message digest.
17. Explain each of the two types of Digital Signature. Also explain the Digital
Signature Algorithm and the Digital Signature System.
18. Describe the Digital Signature Standards.
19. Illustrate Hash functions with example.
20. Discuss the overview of Kerberos. Explain Simple Authentication Dialogue and
more secure Authentication Dialogue in Kerberos Version 4.
Module 4
1. What are firewalls?
2. Explain the features of secure socket layer.
3. List the design goals for a firewall.
4. Explain benefits of IPSec.
5. Write the main concepts on Pretty Good Privacy.
6. Explain Application-level gateway and circuit level gateway.
7. Briefly describe the IP Security Architecture.
8. Explain, with an example, E-mail security.
9. Explain briefly S/MIME.
10. Explain secure socket layer architecture briefly.
11. How do firewalls help to achieve security? Discuss their limitations.
12. Describe briefly about Secure Electronic Transaction.
13. Explain briefly PGP and its services
14. What are Transport mode and Tunnel mode authentication in IP? Explain. How
ESP is applied to both these modes.
15. Draw the IP Security Authentication Header and explain the functions of each
field.
Module 5
5
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar
HOD:
1. What is a Virus?
2. Define OS Security.
3. What are the common intrusion techniques?
4. Explain the terms Threats, Vulnerabilities and Attacks.
5. Explain Memory and Address Protection in OS.
6. Define the models of Security.
7. Briefly discuss virus countermeasures .
8. Explain Bell-La Padula confidentiality model.
9. Explain the various protection mechanisms for OS. Also specify the different
levels of security.
10. What are various Intrusion Detection techniques.
11. Explain memory address protection meachanism in operating system security
12. Brielfy discuss the different models of security.
13. Briefly describe file protection mechanism.
14. What are viruses? Explain the virus related threats and the counter measures
applied.
15. Describe in detail about Password Management.
6
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar
HOD: