Sunteți pe pagina 1din 2

RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL

DEPARTMENT OF INFORMATION TECHNOLOGY


Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

Wei
Que. ghta
Question CO BT
No. ge in
%
1 Discuss with examples the following CO5
a. ARP spoofing
b. TCP SYN flood attack
c. Port scanning 5
d. IP spoofing
e. Honey Pot
f. Packet Sniffing
2 Differentiate between tunnel mode and transport mode of IPSEC CO6 2
protocol. Explain how integrity is achieved
3 List different SSL protocols. Explain in details Handshake protocol. CO6
How does server get authenticated to client. Explain the working of SSL 2
protocol.
4 How IP spoofing leads to Denial of Service(DoS) attack CO5 5

5 Differentiate between Firewall and IDS CO5 5

6 What is the concept of ticket in Kerberos Protocol. CO6 2

7 Compare different types of Firewall. CO5 3

8 What are the roles of different servers in Kerberos protocol. How CO6 2
does a user gets authenticated to different servers
9 What is DoS. List and explain different techniques to perform DoS CO5 5
attack. Explain defense mechanism against DoS.
10 Explain the need of IDS. Differentiate signature based and anomaly- CO5 5
based IDS. State the advantages and disadvantages of both.
11 Explain Secure Email and S/MIME CO6 2
12 Differentiate IPSEC and SSL protocols CO6 2
13 Explain PGP protocol. CO6 2
15 Explain digital signatures schemes CO4 7
a. RSA
b. Elgamal and Schnorr
c. DSS
16 Explain TCP/IP vulnerabilities(Layer-wise) CO5 2
17 Explain Needham Schroeder Authentication Protocol CO4 8

===================================================================
Course Outcomes (CO) Students’ will be able to:
RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL
DEPARTMENT OF INFORMATION TECHNOLOGY
Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

CO1- Ability of students to understand aspects of information security.


CO2- Ability of student to understand importance of various security algorithms.
CO3- Ability of students to understand true meaning of Information and Entropy.
CO4- Ability of students to understand aspects of information i.e. compression techniques. CO5- Ability of
students to understand error control techniques
----------------------------------------------------------------------------------------------------------------
Bloom's Taxonomy
BT1- Remember, BT2- Understand, BT3- Apply, BT4- Analyze, BT5- Evaluate, BT6- Create

S-ar putea să vă placă și