0% found this document useful (0 votes)
204 views2 pages

Ramrao Adik Institute of Technology, Nerul

This document contains a question bank for the subject Cryptography and Network Security. It includes 17 multiple choice questions related to topics such as ARP spoofing, TCP SYN flooding, port scanning, IP spoofing, honey pots, packet sniffing, IPSEC protocols, SSL protocols, digital signature schemes, firewalls, intrusion detection systems, Kerberos authentication, and denial of service attacks. It also lists the course outcomes and Bloom's taxonomy levels associated with each question.

Uploaded by

Aditya Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
204 views2 pages

Ramrao Adik Institute of Technology, Nerul

This document contains a question bank for the subject Cryptography and Network Security. It includes 17 multiple choice questions related to topics such as ARP spoofing, TCP SYN flooding, port scanning, IP spoofing, honey pots, packet sniffing, IPSEC protocols, SSL protocols, digital signature schemes, firewalls, intrusion detection systems, Kerberos authentication, and denial of service attacks. It also lists the course outcomes and Bloom's taxonomy levels associated with each question.

Uploaded by

Aditya Shah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 2

RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL

DEPARTMENT OF INFORMATION TECHNOLOGY


Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

Wei
Que. ghta
Question CO BT
No. ge in
%
1 Discuss with examples the following CO5
a. ARP spoofing
b. TCP SYN flood attack
c. Port scanning 5
d. IP spoofing
e. Honey Pot
f. Packet Sniffing
2 Differentiate between tunnel mode and transport mode of IPSEC CO6 2
protocol. Explain how integrity is achieved
3 List different SSL protocols. Explain in details Handshake protocol. CO6
How does server get authenticated to client. Explain the working of SSL 2
protocol.
4 How IP spoofing leads to Denial of Service(DoS) attack CO5 5

5 Differentiate between Firewall and IDS CO5 5

6 What is the concept of ticket in Kerberos Protocol. CO6 2

7 Compare different types of Firewall. CO5 3

8 What are the roles of different servers in Kerberos protocol. How CO6 2
does a user gets authenticated to different servers
9 What is DoS. List and explain different techniques to perform DoS CO5 5
attack. Explain defense mechanism against DoS.
10 Explain the need of IDS. Differentiate signature based and anomaly- CO5 5
based IDS. State the advantages and disadvantages of both.
11 Explain Secure Email and S/MIME CO6 2
12 Differentiate IPSEC and SSL protocols CO6 2
13 Explain PGP protocol. CO6 2
15 Explain digital signatures schemes CO4 7
a. RSA
b. Elgamal and Schnorr
c. DSS
16 Explain TCP/IP vulnerabilities(Layer-wise) CO5 2
17 Explain Needham Schroeder Authentication Protocol CO4 8

===================================================================
Course Outcomes (CO) Students’ will be able to:
RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL
DEPARTMENT OF INFORMATION TECHNOLOGY
Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

CO1- Ability of students to understand aspects of information security.


CO2- Ability of student to understand importance of various security algorithms.
CO3- Ability of students to understand true meaning of Information and Entropy.
CO4- Ability of students to understand aspects of information i.e. compression techniques. CO5- Ability of
students to understand error control techniques
----------------------------------------------------------------------------------------------------------------
Bloom's Taxonomy
BT1- Remember, BT2- Understand, BT3- Apply, BT4- Analyze, BT5- Evaluate, BT6- Create

You might also like