Documente Academic
Documente Profesional
Documente Cultură
PART A
1. Define cryptography?
2. What are the types of security threats?
3. Define security attacks and mention its classification?
4. What are the classification of passive attacks
5. What are the classification of active attacks
6. Distinguish passive attack from active attack with reference to X.800.
7. What is traffic analysis?
8. What type of information might be derived from a traffic analysis attack?
9. What is meant by security service? Give its classification
10. What is meant by non-repudiation? How does this help the users?
11. What is meant by authentication? Give its classification
12. What is meant by data integrity and data confidentiality
13. What is meant by spread spectrum techniques
14. What are the classification of spread spectrum techniques
15. Define Processing Gain
16. Distinguish slow and fast frequency hop spread spectrum
17. Define CDMA
18. What are the applications of CDMA.
PART B
1. With a neat block diagram explain network security model and associated parameter with
it
2. Explain OSI security architecture along with the services available. Or
3. Describe security services with its categories
4. List and briefly define categories of passive and active security attacks
5. Briefly explain categories of security mechanism
6. Explain Direct sequence spread spectrum technique
7. Explain frequency hop spread spectrum techniques
8. Explain CDMA with Rake receiver
9. Describe generation of PN sequence and state it properties.
Unit-II
PART A
PART B
PART B
UNIT IV
PART A
9. What are the security options PGP allows when sending an email message?
10. Why the leading two octets of message digest are stored in PGP message along with
encrypted message digest?
13. What is the role of Ticket Granting Server in inter realm operations of Kerberos?
15. What are the technical deficiencies in the Kerberos version 4 protocols?
PART B
PART A
1. What is an intruder?
2. What is intrusion detection system?
3. Define password protection.
4. What is malicious program?
5. What is a virus?
6. What is a worm?
7. What is a trojan horse?
8. Who is a masquerader and clandestine user?
9. What is meant by a trusted system?
10. What is a firewall?
PART B
1. Describe briefly about intrusion detection methods.
2. Define intrusion detection and different types of detection mechanism in detail
3. Explain the architecture of distributed intrusion detection in detail
4. Comment on the password selection strategies and their significance.
5. How will you enhance the ability of a system to defend against intruders and malicious
programs
6. List various virus counter measures.
7. Write short notes on worms and viruses.
8. Write short notes on threats
9. Explain the firewall design principles
10. Write short notes on firewall
11. Explain firewalls and how they prevent instruction
12. When system administrator trusts the internal users, what type of firewall is to used?
What are its limitations and how can these difficulties be overcome?
13. Describe about firewall design principle in detail
14. Write the important steps involved in the design of firewalls