Sunteți pe pagina 1din 2

NETWORK SECURITY

06EC832

Question Bank
UNIT 01: OVERVIEW 1. List the examples of security attacks. ( 08, Dec 2011). 2. Give the table showing relationship between security services and mechanisms. ( 08, Dec 2011). 3. Explain the Gatekeeper function and Security recovery. 4. Draw the model of network security. Explain it briefly.

UNIT 02: SYMMETRIC CIPHER 1. With a neat diagram, explain the single round of DES encryption. (08, May/June 2010) 2. Discuss the evaluation criteria of AEs. 3. Explain the strength of DES. 4. Explain block cipher design principles. UNIT 03: 1. Describe RSA algorithm and discuss the security of RSA. (08, Dec 2011) (06, May/June 2010) (04, Dec 2011) (08, Dec 2011)

2. Explain different techniques proposed for distribution of public keys. (08, Dec 2011) 3. Write the RSA algorithm. (04, June 2010)

4. With the neat diagram describe any three ways in which Hash functions can be used. (06, June 2010) UNIT 04: 1. Explain arbitrated digital signature technique. 2. Explain digital signature algorithm. (08, Dec 2011) (08, Dec 2011)

3. What is digital signature? What are its requirements? Discuss direct digital signatures and arbitrated digital signatures. (08, June 2010)

4. Write the digital signature algorithm with block diagram. Explain functions of signing and verification of digital signatures. (12, June 2010)

Department of ECE, SJBIT

Page 1

NETWORK SECURITY PART B UNIT 05: 1. With a diagram explain handshake protocol action. 2. Explain SSL protocol stack.

06EC832

(08, Dec 2011) (04, Dec 2011)

3. Explain SSL protocol stack with a neat diagram and define the different parameters used in session and connection states. (10, June 2010)

4. What is the need of dual signature in SET? Describe with block diagram how they are constructed? 5. Explain in detail the following transactions supported by SET: i) UVIT 06: 1. What are the four basic techniques of choosing password 2. Write a short note on (a) Statistical anomaly detection (b) Rule based intrusion detection UNIT 07: 1. Discuss the following (i) UNIT 08: 1. What is firewall? Explain the various types of firewall configurations (10, June 2010) e-mail viruses (ii) Multiple-Threat Malware (10, June 2010) (10, June 2010) (10, June 2010) Purchase request ii) Payment authorization (08, Dec 2011) (10, June 2010)

Department of ECE, SJBIT

Page 2

S-ar putea să vă placă și