You are on page 1of 6

Doc. No.

sngce/cse/fm/qb/16/cs010 803
Rev: 2

Sree Narayana Gurukulam College of


Engineering,
Kadayiruppu
2016

Department of Computer Science and


Engineering

QUESTION BANK
(Including all questions from previous 5 years University
Exams)

Semester

:8

Sub Name & Code: CS010 803 Security in

Computing

Faculty: Vidhya P.M

1
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

QUESTION BANK
2015-2016
Sub Name & Code: CS010 803 Security in

Computing
Module 1
1. Explain the different Aspects of Security.?
2. What is meant by Network Security?
3. What you mean by Symmetric Cipher Model?
4. What are Poly alphabetic Ciphers?
5. Which are the different methods used to convert a plaintext to Ciphertext?
6. State the difference between Authentication and Confidentiality?
7. State the drawbacks between symmetric and Asymmetric Encryption Scheme?
8. Define Cryptography.
9. What are security services?
10. List out some security mechanisms.
11. What is Cipher? Explain.
12. What is Caesar substitution?
13. Explain Encryption and Decryption.
14. Define Authentication.
15. What is the need for Network security?
16. Write the need for encryption and decryption.
17. What is a Rail Fence Cipher?
18. Write short notes on Row Transposition Cipher.
2
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

19. Briefly describe about the different security attacks.


20. Explain Substitution Techniques for Cipher Text generation?
21. Explain different aspects of network security
22. Explain the different types of attacks, in detail.
23. Write a note on security services and mechanisms.
24. Explain the concept of Cryptography.
25. Write a note on classical encryption techniques.
26. Briefly describe the different security services and the different security
mechanisms.
27. Write short notes on Caesar Cipher and Playfair Cipher.

Module 2
1. What are the criteria for S-box design in DES and its functioning?
2. Describe Avalanche Effect.
3. State the security approaches of RSA
4. Give the ingredients of a Public Key Cryptosystem.
5. Give brief description about the design features of Feistel Network
6. Compare RSA and DES algorithms.
7. Explain the concept of Cryptography.
8. What is meant by Block Cipher?
9. Diferentiate between Stream Cipher and Block Cipher.
10. What are Public Key Cryptosystems? Explain the need and working of RSA
Algorithm.
11. How can we provide Secrecy and Authentication in a Public Key Cryptosystem,
as separately and as together?
12. What you mean by Data Encryption Standard? Explain its Characteristics and
Components.
13. Explain the RSA Algorithm in detail. Compare RSA algorithm with DES
algorithm

3
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

14. What are Feistel Ciphers? Explain Encryption and Decryption using Feistel
Ciphers.
15. What you mean by Data Encryption Standard? Explain its Characteristics and
Components.
16. Explain DES algorithm. Discuss the strength and weakness of DES algorithm.
17. Explain RSA algorithm. Discuss the three possible approaches to attack RSA
algorithm
18. Explain the Important features of modern symmetric key algorithms.
19. Explain the Diffie Hellman key exchange method.
20. Discuss the strengths and weakness of DES algorithm.
21. Explain the elliptic curve cryptography.
22. State Eulers and Formats theorem with proof.
23. Summarize on Modern Block Ciphers.
24. Elaborate the principles of Public Key Cryptography Systems.

Module 3
1. What are Kerberos?
2. What is Authentication?
3. State the drawbacks of Direct Digital Signatures.
4. Give the difference between Kerberos Version-4 and Version-5.
5. What is a Digital Signature? Give its properties

6. Define hash function


7. Define functions of MAC.
8. Explain digital certificates.
9. What are Digital Signatures? Explain its classification and properties in detail.
10. Explain the use of different versions of Kerberos in detail.
11. Explain briefly the X-509 authentication service
12. Explain the functioning of Kerberos server.
13. Explain the importance of Hash functions.
14. Explain the requirements and different approaches for the digital signature
function.
4
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

15. Explain Secure Hash Algorithm with overall processing of a message to produce a
message digest.
16. Explain MD 5 algorithm with overall processing of a message to produce a
message digest.
17. Explain each of the two types of Digital Signature. Also explain the Digital
Signature Algorithm and the Digital Signature System.
18. Describe the Digital Signature Standards.
19. Illustrate Hash functions with example.
20. Discuss the overview of Kerberos. Explain Simple Authentication Dialogue and
more secure Authentication Dialogue in Kerberos Version 4.

Module 4
1. What are firewalls?
2. Explain the features of secure socket layer.
3. List the design goals for a firewall.
4. Explain benefits of IPSec.
5. Write the main concepts on Pretty Good Privacy.
6. Explain Application-level gateway and circuit level gateway.
7. Briefly describe the IP Security Architecture.
8. Explain, with an example, E-mail security.
9. Explain briefly S/MIME.
10. Explain secure socket layer architecture briefly.
11. How do firewalls help to achieve security? Discuss their limitations.
12. Describe briefly about Secure Electronic Transaction.
13. Explain briefly PGP and its services
14. What are Transport mode and Tunnel mode authentication in IP? Explain. How
ESP is applied to both these modes.
15. Draw the IP Security Authentication Header and explain the functions of each
field.

Module 5
5
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

1. What is a Virus?
2. Define OS Security.
3. What are the common intrusion techniques?
4. Explain the terms Threats, Vulnerabilities and Attacks.
5. Explain Memory and Address Protection in OS.
6. Define the models of Security.
7. Briefly discuss virus countermeasures .
8. Explain Bell-La Padula confidentiality model.
9. Explain the various protection mechanisms for OS. Also specify the different
levels of security.
10. What are various Intrusion Detection techniques.
11. Explain memory address protection meachanism in operating system security
12. Brielfy discuss the different models of security.
13. Briefly describe file protection mechanism.
14. What are viruses? Explain the virus related threats and the counter measures
applied.
15. Describe in detail about Password Management.

6
Signature:
Faculty: Vidhya P.M
Prof. P Jayakumar

HOD:

You might also like