UNIT-WISE QUESTION BANK/ PREVIOUS YEAR QUESTIONS (PART A & B)
BTL- Blooms Taxonomy Level:
                                                               Level 1-Remembering
                                                               Level 2- Understanding
                                                               Level 3- Applying
                                                               Level 4-Analyzing
                                                               Level 5- Evaluating
                                                               Level 6- Creating
                                           PART-A& B
S. No                               Question                              Marks BTL     Couse
                                                                                Level
         PART-A Unit 1
1        What is denial of service attack?                                  2      2    CO1
2        Discuss about cryptology and cryptanalyst.                         2      2    CO1
3        Define Encryption and Decryption                                   2      2    CO1
4        What are replay attacks?                                           2      2    CO1
5        Discuss the key range and key size.                                2      2    CO1
6        Define Asymmetric key cryptography. Writeits advantages            2      2    CO1
         and limitations.
7        Compare substitution cipher with transposition cipher.             2      2    CO1
8        What is the man in the middle attack?                              2      2    CO1
9        What is the need of Security?                                      2      2    CO1
10       What are two basic functions used in encryption algorithms?        2      2    CO1
         PART-B Unit 1
1        Write the procedure of play fair cipher and consider the          10      4    CO1
         following:2
             Plaintext: “PROTOCOL”
             Secret key: “NETWORK”
          What is the corresponding cipher text using play fair
         cipher method?
2        Explain various Security Services in detail.                      10      2    CO1
3        List the various substitution cipher techniques and explain       10      2    CO1
         any two with example.
4(a)     Consider the following:                                            5      2    CO1
          Plaintext: “HAMMER”
         Secret key: “PROCEDURE”
         What is the corresponding cipher text using play fair cipher
         method?
4(b)     Compare Symmetric and asymmetric key cryptography                  5
5        List out the Principles of Security? Explain in detail             5      2    CO1
6        Discuss about the Security mechanisms.                            10      2    CO1
7        What is Steganography? Explain various steganography               5      2    CO1
         techniques.
8        Explain the Network security model with diagram.                   5      2    CO1
9        Discuss in detail about various types of Security attacks with     5      3    CO1
         neat diagrams.
10       Write the procedure of Hill cipher and explain with          5    2   CO1
         example.
         PART-A UNIT-2
1        What is electronic code Book?                                2    2   CO2
2        Define Cipher Based Chaining mode.                           2    2   CO2
3        What are the key ingredients of private key cryptography?    2    2   CO2
4        What is the drawback of Diffie and Helman key exchange       2    2   CO2
         algorithm?
5        What is the requirements of hash functions?                  2    2   CO2
6        Compare stream cipher and block cipher.                      2    2   CO2
7        Write about strength of DES algorithm                        2    2   CO2
8        What are the principles of public key cryptosystems?         2    2   CO2
9        How to convert block ciphers into stream ciphers?            2    1   CO2
10       Define stream cipher                                         2    2   CO2
         PART-B Unit 2
1        Explain the AES algorithm.                                   10   3   CO2
2        Consider Diffie-Hellman Scheme with a common prime           10   4   CO2
         q=11, and primitive root α=2
           a) if user ‘A’ has public key YA=9, What is A’s private
         key XA.
           b) if user ‘B’ has public key YB=3, What is shared
         secret key K .
3        a) Differentiate linear and differential crypto-analysis.     5   3   CO2
         b) Describe in detail about Conventional Encryption model     5   2   CO2
4        What is Elliptic Curve Cryptography (ECC)? Discuss           10   3   CO2
         ECC algorithm with neat diagram.
5        Briefly explain the characteristics and operations of        10   3   CO2
         RC4 Encryption algorithm.
6        Explain DES algorithm with suitable examples. Discuss        10   2   CO2
         its advantages and limitations.
7        Explain RSA algorithm with suitable example.                 10   2   CO2
8        Discuss about Blowfish.                                      10   2   CO2
9        a) Draw Feistel cipher structure and explain in detail.       5   2   CO2
         b) Perform encryption and decryption using the RSA            5   4   CO2
         algorithm for the following
         i)p=3, q=11, e=7, M=5
         ii)p=5, q=11.e=3, M=9
10       What is block cipher? Explain various block cipher           10   2   CO2
         modes of operation with neat diagram.
         PART-A UNIT 3
     1   What is a digital signature?                                 2    3   CO3
     2   What is Kerberos? How it is used in security?                2    2   CO3
     3   What is message digest?                                      2    2   CO3
     4   What properties must a hash function have to be useful for   2    2   CO3
         message authentication?
     5   Explain Authentication using symmetric encryption            2    2   CO3
     6   List three approaches to Message Authentication.             2    2   CO3
     7   What are the requirements of authentication?                 2    3   CO3
     8   What is the standard (notation) used for defining X.509      2    2   CO3
       certificate?
 9     What is the drawback of authentication approach using   2    2   CO3
       symmetric encryption?
10     Write a short note public key infrastructure (PKI).     2    2   CO3
       PART-B Unit 3
 1     Explain HMAC algorithm.                                 10   3   CO3
 2     Explain Digital signature algorithm (DSA).              10   3   CO3
 3     What is biometric Authentication? Explain various        5   2   CO3
       biometric authentication techniques.
4(a)   Describe various Digital signatures.                    10   2   CO3
4(b)   Discuss about CMAC.                                      5
 5     Briefly explain about whirlpool algorithm               10   2   CO3
 6     Explain approaches for Digital Signatures based on      10   2   CO3
       public key Encryption?
 7     Write short note on knapsack algorithm.                  5   3   CO3
 8     State the purpose of secure Hash functions. Discuss     10   2   CO3
       secure hash Algorithm with suitable Example.
 9     Illustrate X.509 authentication service.                 5   2   CO3
10     Describe Kerberos version 4 and its authentication      10   2   CO3
       dialogues.
        PART-A UNIT – 4
 1     What are the various PGP Services?                      2    2   CO4
 2     What is RFC 822?                                        2
 3     Write a short note on transport mode and tunnel mode.   2    2   CO4
 4     What are the different approaches to public-key         2    2   CO4
       Management?
 5     How does PGP provide public key management?             2    2   CO4
 6     Give the features of Authentication Header?             2    2   CO4
 7     Explain IP Security.                                    2    2   CO4
 8     Explain about radix64 conversion?                       2    2   CO4
 9     Show the applications 0f IPSec.                         2    2   CO4
10     How MIME is used in email services?                     2    2   CO4
       PART-B Unit 4
 1     Discuss about authentication header.                     5   2   CO4
 2     Demonstrate combined security association.              5    3   CO4
 3     Explain MIME context types.                              5   2   CO4
 4     Briefly discuss the services provided by Pretty Good    10   2   CO4
       Privacy (PGP).
 5     What are different cryptographic algorithms used in     5    2   CO4
       S/MIME? Explain how S/MIME is better than MIME.
 6     Write short note on Pretty Good Privacy.                 5   3   CO4
 7     Draw and discuss IP Security architecture.              10   3   CO4
 8     Write a short note on S/MIME.                            5   3   CO4
 9     Discuss in detail encapsulating security payload.        5   3   CO4
10     Explain PGP Authentication mechanism with neat           5   2   CO4
       diagram.
       PART-A UNIT – 5
 1     What is cross site scripting vulnerability?             2    2   CO5
 2   What are the limitations of firewalls?                      2    2   CO5
 3   What is secure socket Layer?                                2    2   CO5
 4   What are different alert codes of TLS protocol?             2    2   CO5
 5   How to manage the password?                                 2    2   CO5
 6   Recall the web security considerations                      2    2   CO5
 7   Define firewall.                                            2    2   CO5
 8   Define Virus.                                               2    2   CO5
 9   What do you mean by Intruder?                               2    2   CO5
10   Mention the fields of TLS record format.                    2    2   CO5
     PART-B Unit 5                                                        CO5
1    Explain secure electronic transaction in detail.            10   2   CO5
2    Briefly discuss about various types of viruses.              5   2   CO5
3    Demonstrate various types of firewalls.                     10   3   CO5
4    List and briefly define the parameters that define an        5   2   CO5
     SSL session state?
5    What are different services provided by the SSL Record      10   2   CO5
     Protocol? Explain.
6    Describe firewall design principles.                        5    3   CO5
7    What is intrusion? Discuss intrusion detection system       5    3   CO5
     with neat diagram.
8    Recall notes on virtual elections and secure inter-branch   10   3   CO5
     payment transactions.
 9   Discuss about Secure Socket Layer.                          5    2   CO5
10   Explain different virus countermeasure techniques.          5    2   CO5