0% found this document useful (0 votes)
87 views3 pages

3-2 Cse Cns QB

The document contains a comprehensive list of questions related to various aspects of cybersecurity, including cryptography, network security, authentication, and security protocols. Each question is assigned a specific mark value and categorized into different sections and units. The questions cover theoretical concepts, practical applications, and comparisons of security mechanisms and algorithms.

Uploaded by

ssaishiva97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views3 pages

3-2 Cse Cns QB

The document contains a comprehensive list of questions related to various aspects of cybersecurity, including cryptography, network security, authentication, and security protocols. Each question is assigned a specific mark value and categorized into different sections and units. The questions cover theoretical concepts, practical applications, and comparisons of security mechanisms and algorithms.

Uploaded by

ssaishiva97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q.

NO QUESTION MARKS SECTION UNIT


1. Explain the concept of principle of security in Cyber
12 Section-I 1
security with examples.
2. Let message = “CRYPTOGRAPHY”, Ignore the space
between words. Keyword = “MRUH”, find cipher-text 12 Section-I 1
using playfair cipher.
3. Discuss examples from real life, where the following
security objectives are needed:
12 Section-I 1
a) Confidentiality b) Integrity c) Non-repudiation.
Suggest suitable security mechanisms to achieve them.
4. Encrypt the message “I AM INDIAN” using Caesar cipher
with key = 15. Ignore the space between words. Decrypt 12 Section-I 1
the message to get the Original plaintext.
5. a) Explain about Substitution Techniques with examples?
(6M)
12 Section-I 1
b) Differentiate Substitution Techniques and
Transposition Techniques? (6M)
6. Summarize about Security Approaches in network
12 Section-I 1
security?
7. Explain active and passive attack with example. 12 Section-I 1
8. Define steganography? Discuss the role of steganography
in augmenting the corporation's security posture, 12 Section-I 1
including practical applications and potential challenges.
9. What is the role of Key Range and Key Size of different
12 Section-I 1
types of ciphers? Explain it with examples.
10. What do you mean by cryptography? Explain following
basic terms with example. 12 Section-I 1
a) Plain Text b) Cipher Text c) Encryption d) Decryption
11. Explain following Algorithm Modes with example:
a) Electronic Code Book (ECB)
b) Cipher Block Chaining (CBC) 12 Section-II 2
c) Cipher Feedback (CFB)
d) Output Feedback (OFB).
12. Explain following Algorithm Types with example:
a) Block Cipher 12 Section-II 2
b) Stream Cipher
13. What do you mean by DES? Diagrammatically illustrate
the structure of DES & describe the steps in DES 12 Section-II 2
encryption process with example.
14. With an example, explain the encryption and key
12 Section-II 2
schedule operations of AES.
15. Describe International Data Encryption (IDEA)
algorithm with its Key generation, encryption and its 12 Section-II 2
applications in Cyber security world.
16. Calculate the cipher text with Knapsack weight value
D=1, 2, 4,10,20,40 and Plain Text value 100100 111100 12 Section-II 2
101110.
17. What are different block cipher algorithms? Explain each
algorithm with a suitable diagram and also present the 12 Section-II 2
pros and cons of each algorithm.
18. Write a short notes on Differential and Linear
12 Section-II 2
Cryptanalysis.
19. Explain about Blowfish Algorithm with focus on Key
12 Section-II 2
generation and Encryption and Decryption process.
20. Explain the encryption and key generation modes of
12 Section-II 2
operations of IDEA with suitable example.
21. Differentiate Asymmetric and Symmetric Key
12 Section-III 3
cryptography with suitable parameters.
22. Explain the concept of RSA Algorithm. Describe Security
12 Section-III 3
Analysis of RSA.
23. Write and explain the Digital Signature Algorithm 12 Section-III 3
24. Illustrate the working of MD-5. List out difference
12 Section-III 3
between MD5 and MD4.
25. Describe the advantages and disadvantages of symmetric
12 Section-III 3
and asymmetric-key cryptography.
26. Write a short notes on Secure Hash Algorithm. 12 Section-III 3
27. Define Public Key Infrastructure (PKI) and explain its
role in ensuring secure communication on the internet.
12 Section-III 3
How does PKI utilize digital certificates for
authentication and encryption?
28. Explain the PKIX model and its significance in
12 Section-III 3
establishing trust relationships within a PKI ecosystem.
29. Compare and contrast SSL with Secure Hypertext
Transfer Protocol (SHTTP) in terms of security 12 Section-III 3
mechanisms, compatibility, and adoption.
30. Discuss the purpose and functionality of the Time
Stamping Protocol in ensuring the integrity and
authenticity of digital documents. How does time 12 Section-III 3
stamping contribute to non-repudiation in electronic
transactions?
31. Compare and contrast Secure Socket Layer (SSL) and
Secure Electronic Transaction (SET) protocols in terms of
12 Section-IV 4
their security features and suitability for different types
of online transactions.
32. What is the purpose of Public Key Infrastructure (PKI) in
12 Section-IV 4
the context of digital certificates?
33. Describe the role of XML (eXtensible Markup Language)
in PKI and security. How is XML utilized in the
12 Section-IV 4
representation and exchange of security-related
information in web-based applications?
34. Provide an overview of basic concepts in Internet
Security Protocols. What are the primary objectives of
12 Section-IV 4
these protocols, and how do they contribute to securing
online communication?
35. Explain the Secure Socket Layer (SSL) protocol and its
role in providing secure communication over the
12 Section-IV 4
internet. Discuss the key features, components, and
handshake process of SSL.
36. Discuss the role of 3-D Secure Protocol in enhancing the
12 Section-IV 4
security of online card payments.
37. What are Public Key Cryptography Standards (PKCS), and
how do they standardize cryptographic operations
12 Section-IV 4
within a PKI environment? Provide examples of
commonly used PKCS standards and their applications.
38. Explain Digital Certificate Creation Steps with suitable
12 Section-IV 4
diagram.
39. What do you mean by Private Key Management? Explain
12 Section-IV 4
Mechanisms for protecting private keys
40. Critically assess the security implications of using crypto
currencies like Bitcoin in online transactions,
12 Section-IV 4
considering factors such as anonymity, decentralization,
and regulation.
41. Explain the authentication standards Kerberos with
12 Section-V 5
suitable diagram.
42. Define the term "password authentication" and explain
12 Section-V 5
its basic process.
43. What are the security implications of implementing
biometric authentication systems? How can these 12 Section-V 5
systems be protected against attacks and misuse?
44. What are the fundamental concepts of authentication,
12 Section-V 5
and why is it essential in information security?
45. Discuss the role and types of Firewall for organization
12 Section-V 5
level with suitable diagram.
46. Explain the concept of authentication tokens. What are
the different types of authentication tokens, and how do 12 Section-V 5
they enhance security?
47. Describe the process of two-factor authentication (2FA).
How does it enhance security compared to traditional 12 Section-V 5
password-based authentication?
48. Explain the role of E-mail Security. How PGP will help for
12 Section-V 5
E-mail security.
49. What is IP Security? Give brief note on IPSec Key
12 Section-V 5
Management.
50. Write a short Notes on:
a) Virtual Private Networks 12 Section-V 5
b) Intrusion Detection

You might also like