100% found this document useful (1 vote)
2K views17 pages

OBE Question Bank

This document contains a question bank for the course "Cryptography and Cyber Security" covering 5 units. It includes 41 multiple choice questions ranging from basic definitions to complex concepts involving cryptography algorithms, ciphers, encryption techniques, network security models, and cyber attacks. The question bank is intended to assess students' understanding of fundamental security concepts from an introductory to an advanced level.

Uploaded by

KAVITHA T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views17 pages

OBE Question Bank

This document contains a question bank for the course "Cryptography and Cyber Security" covering 5 units. It includes 41 multiple choice questions ranging from basic definitions to complex concepts involving cryptography algorithms, ciphers, encryption techniques, network security models, and cyber attacks. The question bank is intended to assess students' understanding of fundamental security concepts from an introductory to an advanced level.

Uploaded by

KAVITHA T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

M.A.M.

COLLEGE OF ENGINEERING AND TECHNOLOGY


Siruganur, Tiruchirappalli – 621 105.

OBE - Question Bank

Course Code CB3491


Course Name Cryptography and Cyber security
Year & Semester III-year V Semester
Department COMPUTER SCIENCE AND TECHNOLOGY

Faculty Name T.KAVITHA

Regulations AU – 2021
Academic Year 2023 – 24

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

CO503.1 Summarize the fundamental concepts of cryptographic and cyber security using
algorithms.(K2)
Sl Question RBT Unit
No. level No.
Part A
1. Define Security trends. K1 I
2. State Legal, Ethical and Professional Aspects of Security. K1 I
3. Give Need for Security at Multiple levels. K I
2
4. Specify Security Policies. K I
1
5. Identify the types of attack. K I
2
6. Define Model of network security. K I
1
7. Identify an example for substitution and transposition ciphers. K I
2
8. Explain network security. K I
2
9. Distinguish Encryption and Decryption. K I
2
10 Define cryptography. K I
. 1
11 What are the 3 aspects of security? K I
. 2
12 Define security mechanisms. K I
. 1
Summarize the difference between Substitution and Transposition
13 K I
techniques.
. 2
Give the list of keys are required for two people to communicate
14 K I
via a cipher.
. 2
15 Compare Block and Stream cipher. K I
. 2
16 Compare cryptanalysis and cryptography K I
. 2
17 Define Steganography. K I
. 1

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

Decipher the following cipher Text using brute force attack:


18 K I
CMTMROOEOORW (Hint: Algorithm-Rail fence)
. 2
Convert the Given Text “STAY SAFE ” into cipher text using Rail
19 K I
fence Technique.
. 2
20 Differentiate active attack and passive attack. K I
. 2
21 Write the Euclidean Algorithm. K II
. 1
List the fundamental elements of abstract algebra or modern
22 K II
algebra
. 1
23 Why set of all Integers is not a field? K II
. 1
What is triple encryption? How many keys are used in triple
24 K II
encryption?
. 1
25 Define Finite Group K II
. 1
26 Define Coprimes. K III
. 1
27 Define Euler‟s theorem. K III
. 1
28 What is a primitive root of a number? K III
. 1
29 State Fundamental Theorem of Arithmetic. K III
. 1
30 Define Euler‟s totient function. K III
. 1
31 State Fermat‟s little theorem. K III
. 1
32 What is the role of compression function in hash function? K IV
. 1
33 Define the term message digest. K IV
. 1
34 Define the classes of message authentication function. K IV
. 1
35 List the authentication message requirements. K IV
. 1
36. Define S/MIME. K1 V
37. Expand and define SPI. K1 V
38. Identify the steps involved in SET Transactions. K1 V

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

39 Define SET? What are the features of SET? K V


. 1
40 Identify the benefits of IPSecurity. K V
. 1
41 Identify the five header fields defined in MIME. K V
. 1
Part B
Describe the differences between steganography and cryptography
1. K I
with example in details.
1
(13)
(i) Define Security trends - Legal, Ethical and Professional
Aspects of Security.
2. (6) I
K
(ii) State about the Security at Multiple levels and explain Security 1
Policies. (7)
Describe:
(i) Playfair cipher (5)
3. K1 I
(ii) Railfence cipher (4)
(iii) Vignere cipher (4)
(i) Describe the following
a) Message Integrity (2)
b) Denial of Service (2)
4. c) Availability (2) K1 I
d)Authentication (2)
(ii) List and briefly describe categories of passive and active
security attacks. (5)
Explain the network security model and its important parameters
5 K2 I
with a neat block diagram.
Explain the Characteristics of Modern Cryptography and working
6 K2 I
Principle.
Prove the following
(i).If n and a are coprime, then aφ(n) ≡ 1 (mod n).
7 (ii) Use Euler's Theorem to find a number a between 0 and 9 such K1 III

that a is congruent to71000 modulo 10. (Note that this is the same as
the last digit of the decimal expansion of 71000.)
With a neat sketch explain the Elliptic curve cryptography with an
8 K1 III
example.
9 Describe Modulo Arithmetic operations and properties in detail. K1 II

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

(i) Describe in detail the key generation in AES algorithm and its
10 expansion format II
K1
(ii)Describe Triple DES and its applications.
11 Describe AES algorithm with all its round functions in detail. K1 II
12 Describe DES algorithm with neat diagram and explain the steps. K1 II
Solve gcd(98, 56) using Extended Euclidean algorithm. Write the
13 K2 II
algorithm also
14 Discuss the following in detail
(i) ModularExponentiation II
K2
(ii) Finite Fields
Explain the DES and General structure of DES with diagrams.
15 K2 II
(13)
(i) Where hash functions are used? What characteristics are needed
in secure hash function? Write about the security of hash functions
16 K1 IV
and MACs.
(ii) Discuss the classification of authentication function in detail.
Describe digital signature algorithm and show how signing and
17 K1 IV
Verification is done using DSS.
18 Describe SHA2 in detail with neat diagram. K1 IV
What is Digital Signature? Explain how it is created at the sender
19 end and retrieved at receiver end .differentiate digital signature IV
K1
from digital certificate.
How Hash function algorithm is designed? Explain their features
20 K2 IV
and Properties.
i) Explain in detail message authentication code and its
21 requirements. K2 IV
(ii)Illustrate the security of hash functions and MACs.
22 Describe Challenge-Response protocols in detail. K2 IV
Describe the working of SET with neat diagram.
23 K1 V
(13)
Describe in detail about SSL/TLS.
24 K1 V
(13)
Explain the architecture of IPsec in detail in detail with a neat block
25 K2 V
Diagram.
26 Describe in detail about S/MIME. K1 V
Discuss authentication header and ESP in detail with their packet
27 K2 V
format.
Describe PGP cryptographic functions in detail with suitable block
28 K1 V
Diagrams.

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

i) Discuss transport mode and tunnel mode authentication in IP?


Describe how ESP is applied to both these modes.
29 (7) V
ii) Draw the IP security authentication header and describe the K2
functions of each field. (6)
Part C
1. Explain the Classical Encryption Technique with an example (15) K2 I
i) Define Steganography? Describe various techniques used in
Steganography. (7)
2 ii) State mono-alphabetic cipher? How it is different from Caesar
K2 I
cipher (6)
i) Discuss the substitution Techniques in detail. (7)
3 ii) Discuss the Transposition Techniques in detail. K2 I
(6)
i)Discuss the various security mechanisms. (6)
4 ii)Summarize OSI security architecture model with neat diagram. K I
(7) 2
Classify and briefly define types of cryptanalytic attacks based on
5 what is known to the attacker. (7) I
K2
Explain briefly the two general approaches to attacking a cipher. (6)
6 Explain Key-distribution center with all aspects with neat diagram. K2 II
Measure the Public key-distribution and Symmetric Key-
7 K2 II
Distribution.(15)
State and explain the Chinese remainder theorem. What are the
last twodigits of 4919? K III
8
(15) 2
With a neat diagram, explain the steps involved in SHA
algorithm for encrypting a message with maximum length of less
9 K IV
than 2128 bits and produces as output a 512-bit message digest.
2
(15)
Create the process of deriving eighty 64-bit words from 1024
bits for processing Of a single blocks and also discuss single
1 IV
round function in SHA-512 algorithm. Show the values of W16, K
0
W17, 2
W18 and W19. (15)
1 What are the properties of Hash Function. K IV
1 2
1 Explain the performance of PGP. Compare it with S/MIME. K V
2 2

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

(i) Write the steps involved in the simplified form of the SSL /
TLS
1 K V
3 protocol. 2
(8)
Generalize the methodology involved in computing the keys in
SSL
/ TLS protocol.
i) Explain the various measures that may be used for intrusion
detection.
1 K V
ii) Explain the various roles of firewalls and related terminology in
4 2
detail. (7)
Explain how secure electronic transaction (SET) protocol enables
15 K2 V
e- transactions. Explain the components involved.

CO503.2: Apply various mathematical concepts relevant to build symmetric and asymmetric
key cryptosystems..(K3)
Sl Question RBT Uni
No. level t
No.
Part A
1. Why is asymmetric cryptography bad for huge data? Specify the reason. K2 III
2. Compare public key and private key. K2 III
3. Explain elliptic curve. K III
2
4. Find gcd (1970, 1066) using Euclid‟s algorithm. K II
3

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

5. Summarize the properties of congruence‟s. K II


2
6. State the five modes of operation of block cipher? K2 II
7. Explain the strength of triple DES. K2 II
8. Explain S-DES Structure. K2 II
9. Show general design of S-AES encryption cipher K II
1
1 Identify Data units used in AES. K II
0. 3
1 7
K II
1. Find 11 mod 13.
3
1 Compare DES and AES. K II
2. 2
1 List the parameters (block size, key size and no. of rounds) for the three
K II
3. AES versions.
2
1 Explain idea of RC4 stream cipher. K II
4. 2
1 Explain Flat Multiple KDCs. K II
5. 2
1 Discuss Key-Distribution Center. K II
6. 2
1 Explain Hierarchical Multiple KDCs. K II
7. 2
1 Explain whether symmetric and asymmetric cryptographic algorithm
K III
8. need
2
key exchange.
1 Give the applications of the public key cryptosystem K III
9. 3
2 Using the properties of discrete logarithms, show how to solve the
K III
0. following congruence: x2 ≡ 36 (mod 77).
3
2 Illustrate the purpose of Diffie Hellman key exchange. K III
1. 3
2 Explain Elliptic Curves over Real Numbers K III
2. 2
2 Explain attacks of RSA cryptosystem K III
3. 2
2 Perform encryption and decryption using RSA algorithm for the
K III
4. following. p=7, q=11; e=17; m=8.
3
Part B

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

5. Summarize the properties of congruence‟s. K II


2
6. State the five modes of operation of block cipher? K2 II
7. Explain the strength of triple DES. K2 II
8. Explain S-DES Structure. K2 II
9. Show general design of S-AES encryption cipher K II
1
1 Identify Data units used in AES. K II
0. 3
1 7
K II
1. Find 11 mod 13.
3
1 Compare DES and AES. K II
2. 2
1. Given Cipher text “YMJTYMJWXNIJTKXNQJSHJ”, the message is
encrypted by Caesar cipher and k=5. Try to decrypt the message. (7)
Using Vigenere cipher, encrypt the word “explanation” using the Key K I
leg. 3
(6)
2. Encrypt the following using play fairci pherusing the
keyword MONARCHY. Use X for blank spaces “SWARAJ K I
IS MY BIRTH 3
RIGHT” (13)
3. Encrypt the message “FINALYEAR” at the sender end and decrypt the
message at receiver end With using Hill-cipher with the key.
K I
3
(15)

4. Perform encryption and decryption using Hill Cipher for the following.
K I
Message: PEN and Key: ACTIVATED (13)
3
5. (i) Illustrate the rules to perform encryption using play fair cipher and
encrypt „snowshooos‟ using „monarchy‟ I and J count as one letter and
x is the filler letter. (8) K I
(ii) Encrypt the word “Semester Result” with the keyword 3
“Examination” using playfair cipher. (5)
6. Identify the purpose of Differential and linear cryptanalysis and explain
K II
with neat diagram. (13)
3
7. Discuss the properties that are to be satisfied by Groups, Rings and Fields.
K2 II
(13)
8. Explain about Block cipher design principles – Block cipher mode of
K2 II
operation. (13)

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

9. Discuss about Public Key distribution and Symmetric-Key Distribution.


K2 II
(13)
10 Users A and B use the Diffie-Hellman key exchange
. technique, a common prime q=11 and a primitive root
alpha=7.
(i) If user A has private key XA=3.What is A‟s public key YA? (5) K III
(ii)If user B has private key XB=6. What is B‟s public key YB? (4) 3
(iii)What is the shared secret key? Also write the algorithm.
(4)
11. Summarize Chinese Remainder theorem and find X for the given set of
congruent equation using CRT
X ≡ 1 (mod 5) X ≡ 2 (mod 7) X ≡ 3 (mod 9) X ≡ K3 III
4(mod 11) (13)
Part C
1 Compare transposition cipher and substitution cipher. Apply two stage
transpositions Cipher on the “treat diagrams as single units” using the K 1
keyword “sequence”. (15) 3
2 Find the secret key shared between user A and user B using Diffie-
Hellman algorithm for the following q=353; α (primitive root)=3, III
K
XA=45
3
and XB=50

(13)
3 Experiment with Taxonomy of potential attacks on RSA. K III
3
(13)
4 Explain Chinese Remainder theorem and find X
for the given set of congruent equation using
K III
CRT X ≡ 2 (mod 3)X ≡ 3 (mod 5)
3
X ≡ 2 (mod 7)

(7)
State and Prove Fermat‟s theorem.
(6)
5 For each of the following elements of DES, indicate the comparable
element in AES if available.
i) XOR of sub key material with the input to the function
(4) K II
ii) f function 3
(3)
iii) Permutation p
(3)
Swapping of halves of the block.
(3)

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

6 Explain the following modes of operation in block cipher.


(i) Electronic code book and Cipher block chaining. (7) K2 II
Cipher feedback mode and output feedback mode. (6)
7 (i) How Meet in the middle attack is performed on double Data
encryption Standard? (7)
(ii) Explain the substitution bytes transformation and add round key K2 II
transformation of AES cipher. (6)

CO503.3: Apply cryptography algorithms to provide security for real time applications (K3)

Sl Question RBT Unit


No. level No.
Part A
1. Assume that a = 255 and n = 11. We can find q = 23 and r = 2 using the
division algorithm we have learned in arithmetic. Calculate q and r for a= K3 III
-255 and n=11
2. Assume n has 200 bits. Give the number of bit operations needed to run
K2 III
the divisibility-test algorithm?
3. Prepare any one technique attacking in RSA. K II
2 I
4. What are the differences between Conventional Encryption and Public-
Key K II
Encryption. 2 I
5. Are strong primes necessary in RSA? K II
2 I
6. Point out the properties a digital signature. K IV
2
7. Assume a client C wants to communicate with a server S using Kerberos
K IV
protocol. Explain How can it be achieved?
3
8. Create a simple authentication dialogue used in Kerberos. K IV
3
9. Design the role of Ticket Granting Server in inters realm operations of
K IV
Kerberos.
3
PART -
B

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

1. i. Describe RSA algorithm


(6)
K II
ii. P
1 I
erform encryption and decryption using RSA algorithm for the
following: p=7 q=11, e=7, M=9.

(7)
2. Prove the Following
i) If p is a prime and a is a positive integer relatively prime to p, then
p-1
a ≡ 1(mod p)
(7) K1 III
p
ii) If p is a prime and a is a positive integer, then a ≡ a (mod p).

(6)
3. (i) Discuss how discrete logarithm evaluated for a number? What is the
role of discrete log in the Diffie - Hellman key exchange in
exchanging the secret key among two users? (7)
K2 III
What are elliptic curves? And also discuss how the elliptic curves are
useful for Cryptography? (6)
4. Explain the Key generation, encryption, and decryption in ElGamal.
K2 III
(13)
Part C

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

1. Users Alice and Bob use the Diffie-Hellman key exchange technique
with a common prime q = 83 and a primitive root α = 5.
i) If Alice has a private key XA = 6, what is Alice‟s public key YA? (6) K3 II
ii) If Bob has a private key XB = 10, what is Bob‟s public key YB? (6) I
iii) Construct the shared secret key (3)
2.
3. i) In a public-key system using RSA, you intercept the cipher text C = 10
sent to a user whose public key is e = 5, n = 35. What is the plaintext M?

(8) K3 II
ii) In an RSA system, the public key of a given user is e = 31, n = 3599. I
Determine the private key of this user?
(7)
4. Discuss the ElGamal cryptosystem and elliptic curve cryptosystem (15) K2 II
I

CO503.4: Differentiate the various authentication algorithms used in real time applications.
(K4)
Sl Question RBT Uni
No. level t
No.
Part A
1. State any three requirements for authentication. K1 IV
2. How is the security of a MAC function expressed? K2 IV
3. Identify the requirements for message authentication. K I
3 V
4. Give the two approaches of digital signature. K I
2 V
5. Explain the significance of signature function in Digital Signature
K I
Standard (DSS) approach.
2 V
6. Identify the security services provided by digital signature. K I
3 V
7. How digital signatures differ from authentication protocols? K I
2 V
8. How do you specify various types of authentication protocol? K I
1 V
9. Explain the purpose of X.509 standard. K I
4 V
1 What is Kerberos? Point out its uses. K I
0. 4 V

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

1 Identify 4 requirements defined by Kerberos. K I


1. 3 V
1 Summarize the Classes of message authentication function. K I
2. 2 V
1 Assume a client C wants to communicate with a server S using Kerberos K V
3 protocol. Explain How can it be achieved? 5
1 Create a simple authentication dialogue used in Kerberos. K V
4 6
1 Design the role of Ticket Granting Server in inters realm operations of K V
5 Kerberos. 6

Part B
1. Explain the different approaches to message authentication K I
2 V
2. Illustrate the steps involved in Signature generation and Verification
K I
Functions of DSS.
3 V
3. Explain in detail about X.509 authentication services. K I
4 V
4. Explain Client Server Mutual authentication with example flow diagram.
I
(13) K
V
4
5. i) What is Kerberos? Explain how it provides authenticated Services. (7)
K I
ii) Explain the format of the X.509 certificate.
4 V
(6)
6. Discuss the roles of the different servers in Kerberos protocol. How does
the user get authenticated to the different servers? K2 IV
(13)
7. Explain briefly about the architecture and certification mechanisms in
K3 IV
Kerberos and X.509. (13)
Part C
1. With a neat diagram, explain the steps involved in SHA algorithm for
K V
encrypting a message with maximum length of less than 2128 bits and
produces as output a 512-bit message digest. 5
(15)
2. (i)Elaborate the way how the limitations of Kerberos version 4 is overcome in
the environmental shortcomings and technical deficiencies. K V
(8) 6
(ii) Elaborate how the encryption is key generated from password in Kerberos.
(7)

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

3. (i) Enumerate the properties of Hash Function. (8)


(ii) Evaluate the authentication protocol and list its limitations, how the
K V
limitations overcome. (7)
5
CO503.5: Identify the cyber security crimes and its solutions using cyber forensics software..
(K2)

Sl Question RBT Uni


No. level t
No.
Part A
1. What is Cyber Security? K1 V
2. What are the features of cyber security? K1 V
3. What does cyber security protect? K1 V
4. What is the existence of weakness in a system or network is known as? K1 V
5. What is Information Security? K1 V
6. What type of cyber-crime, its laws and punishments does section 66 of the K1 V
Indian IT Act holds?
7. K1 V
What is cyber crime and its classification?
8. What are the classification of cyber forensics? K1 V
9. What are the classification of cyberspace? K1 V
1 What are the classification of malware in cyber security? K1 V
0.
1 Differentiate spyware and virus. K V
1. 4
1 What are the forms of password cracking techniques Mcq? K1 V
2
1 K1 V
What form of password cracking is always successful if given sufficient
3. time?
1 What are the 5 types of password cracking methods? K1 V
4.
1 What is the difference between rainbow table and brute force? K1 V
5.
1 What is cracking techniques? K1 V
6.
1 What is in SQL injection? K1 V
7.

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

1 K1 V
Why is SQL injection used?
8.
1 What prevents SQL injection? K1 V
9.
2 K1 V
What are the types of network access control?
0.
2 What is the principle of NAC? K1 V
1.
2 What is cloud security? K1 V
2.

1. Explain in detail about Cyber Crime and Information Security V


K2
2 Explain in detail about classification of cyber crime.
K2 V
3 Explain in detail about SQL injection
K2 V
4 Explain in detail about network access control
K2 V
Part C
1. (i) Write the steps involved in the simplified form of the SSL / TLS protocol. (8) K6 V
(ii) Generalize the methodology involved in computing the keys in SSL / TLS
protocol. (7)
2. Discuss cyber security Antipattern catalog.
K V
2
3. Elaborate Cyber crime play a vital role against person ,property and govt. to
protect all valuable information and rights?
K V
2
Discuss about the Cybercrime activities in Mobile Devices?

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE
M.A.M. COLLEGE OF ENGINEERING AND TECHNOLOGY
Siruganur, Tiruchirappalli – 621 105.

CO503.6: Apply the various security applications to overcome the information threat.(K3)

Sl Question RBT Uni


No. level t
No.
Part A
1. Identify the benefits of IP Security. K1 I
2. Differentiate transport and tunnel mode in IPsec. K2 I
3. What is a Threat? List their types. K I
1
4. How digital signatures differ from authentication protocols? K IV
3
5. How does application security protect information systems? K V
3
6. What are the various security threats and threats to information security? K V
2
Part B
1. Explain the network security model and its important parameters with a neat
block diagram.
K V
4
2. What is Proliferation of Mobile and Wireless Devices? Explain?
K1 V
3. Discuss about Authentication Service Security? K2 V
4. Discuss about the Security implications for Organizations K2 V
5. Discuss about the web threats for Organizations?
K V
2
Part
C
1. How can you avoid physical security threats? Discuss.
K V
2
2. K I
Discuss about Computer Security Threats, Issues, and Vulnerabilities 2

CB3491 – Cryptography and Cyber Security


Prepared By: Mrs.T.Kavitha, Assistant Professor, Department of CSE

You might also like