How To Exam?

a knowledge trading engine...


SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper

Thursday, 31 January 2013 12:05Web
iv) firewall implementations
5. discuss different ways to protect passwords
6. define the password selection strategies.
7. discuss the taxonomy of malicious programs in detail.
8. discuss the nature of viruses and provide a general depiction of its structure.
9. provide a detailed note on Antivirus techniques.
10. Briefly discuss the digital immune system
11. explain the concepts of trusted systems.

UNIT II
PART A

1. What is meant by security attack?
2. What is meant by security mechanism?
3. What is meant by security service?
4. provide two examples of security attacks.
5. describe passive and active attack
6. elaborate the two kinds of passive attacks?
7. What is traffic analysis?
8. elaborate the four categories of active attacks?
9. provide the general model for network security.
10.Give the general model for conventional cryptosystem.
11. What is cryptography?
12. Define cryptanalysis
13. Define brute force attack.
14. What is meant by computationally secure encryption scheme?
15. What is meant by unconditionally secure encryption scheme?
16. What are the essential ingredients of a symmetric cipher model.
17. List any 2 substitution encryption techniques.
18. List the drawbacks in caeser cipher.
19. Decrypt the term "piggybacking" using caeser cipher.
20. Why monoalphabetic ciphers are easy to break?
21. What is the difference ranging from monoalphabetic cipher and polyalphabetic
cipher
22. List the two issues with one-time pad substitution technique.
23. List the differences ranging from block cipher and stream cipher
24. What is steganography? Write about its merits and demerits.
25. What is a transposition cipher?
26. What are the differences ranging from transposition and substitution encryption
techniques?
27. Encrypt "the scheme really works well" using transposition cipher. Use the key
five four two one three for encryption.
28. Encrypt the message "attack postponed until 2 am" using 1 stage of
transposition. Use the key six two five three seven 1
29. Briefly discuss avalanche effect in DES.
30. What is the purpose of S-boxes in DES?
31. What are the various block cipher modes of operation?
32. What are the advantages of counter block cipher mode of operation?
33. Write the advantage and disadvantage of output feedback mode of operation.



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER SRM University 2007 B.Tech Computer Science and Engineering BANK FOR CS-356 NETWORK SECURITY - Question Paper