0% found this document useful (0 votes)
16 views8 pages

Ccs354 Ns Qb

The document is a question bank for the course CCS354 - Network Security, aimed at third-year students for the academic year 2024-2025. It outlines course outcomes, Bloom's taxonomy levels, and a comprehensive list of questions categorized by units covering topics such as encryption techniques, key management, access control, application layer security, and security practices. Each question is linked to specific course outcomes and cognitive levels to facilitate assessment and learning.

Uploaded by

nowfaldgl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views8 pages

Ccs354 Ns Qb

The document is a question bank for the course CCS354 - Network Security, aimed at third-year students for the academic year 2024-2025. It outlines course outcomes, Bloom's taxonomy levels, and a comprehensive list of questions categorized by units covering topics such as encryption techniques, key management, access control, application layer security, and security practices. Each question is linked to specific course outcomes and cognitive levels to facilitate assessment and learning.

Uploaded by

nowfaldgl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

SCHOOL OF COMPUTING

DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE

QUESTION BANK

SUBJECT
CCS354 – NETWORK SECURITY CLASS III YEAR–6th SEM
CODE&TITLE
COURSE IN- 2024-2025
Mr.P.V.SAMUEL DEVAKUMAR AY
CHARGE (EVEN SEM)

Course Outcomes:
CO1 Classify the encryption techniques
CO2 Illustrate the key management technique and authentication
CO3 Evaluate the security techniques applied to network and transport layer
CO4 Discuss the application layer security standards.
CO5 Apply security practices for real time applications.

Blooms Taxonomy:
REMEMBERING UNDERSTANDING APPLYING ANALYSING EVALUATE CREATE
R U A AN E C

UNIT – I - INTRODUCTION

Q. No. Questions BT CO

PART–A

1 State the difference between threats and attacks R CO1


What is meant by Denial of Service and Distributed Denial of
2 Service? AN CO1
3 Write a short note on security policy. R CO1

4 Why do we need security? E CO1

What are the legal and ethical issues involved in computer


5 security? R CO1
6 Give the classification of attack. A CO1
7 Write the difference between active and passive attack AN CO1

8 What is message digest? What are the requirements of it? E CO1

9 How can we verify a Digital Certificate? R CO1


10 What is a passive attack? E CO1
11 What is active attack? E CO1
12 Define symmetric encryption. A CO1
13 What is one-way property? E CO1
14 Define hash function? R CO1
15 What is birthday attack? E CO1
16 What is MAC? E CO1
17 What are two approaches of digital signature? E CO1

PART- B & C
1 What is message digest? Explain its importance U CO1

2 Define hash function. Discuss security of hash functions U CO1

3 Explain in detail Birthday attack. C CO1

4 Describe SHA-512 algorithm U CO1

5 What are the different types of attacks? Explain it. U CO1

Explain the network security model and its important parameters


6 R CO1
with neat block diagram.
Compare the uses of MAC and hash function .Represent them
7 U CO1
using appropriate diagram
What is a digital signature? Explain the key generation, signing and
8 E CO1
signature verification.
9 Explain Digital Signature algorithm E CO1
UNIT – II – KEY MANAGEMENT AND AUTHENTICATION

Q. No. Questions BT CO

PART–A
What is public key? A
1 CO2
What is public key certificate? A CO2
2
What is symmetric key? A CO2
3
Define password protection. R CO2
4
What is Kerberos? E CO2
5
Show how SHA is more secure than MD5? A CO2
6
What are the certificates revoked in X.509? A CO2
7
What is key distribution center? A CO2
8
What are the advantages of key distribution? A CO2
9
What is key management? A CO2
10
Define session key. CO2
11 R
What is PKI? A CO2
12
What is key distribution? A CO2
13
What is digital certificate? A CO2
14
What is certification authority? A CO2
15
Define Realm. R CO2
16

PART- B & C
CO2

1 Explain briefly about the architecture and certification


mechanism in Kerberos and explain X.509.
A
R CO2
2
Explain the format of the X.509 certificate.
Shortly describe about the elements of X.509 certificate. CO2
3 U
Explain in detail the distribution of public keys in network CO2
4 security.
R
Elaborately explain Kerberos authentication mechanism with CO2
5 suitable example.
A
Explain Kerberos version 4 in detail. CO2
6
A
Discuss the strength and weakness of Kerberos. U CO2
7
CO2
8 Explain the Kerberos authentication mechanism for accessing
remote server. C

UNIT – III – ACCESS CONTROL AND SECURITY

Q. No. Questions BT CO

PART–A
A
1 What is SSH? CO3
What is SSL session? A CO3
2
Which of the two services provided by SSL record protocol? AN CO3
3
What is the purpose of HTTP? A CO3
4

What is the difference between an SLL connection and an CO3


AN
5 SSL session?
R CO3
6 Define TLS.
A CO3
7 What is Network Access Control?
AN CO3
8 Differentiate Pre-admission and Post-admission.
R CO3
9 Define Extensible authentication protocol.
R CO3
10 List the advantages of network access protocol.
A
CO3
11 What is IPSec?
A CO3
12 What is ESP?
A CO3
13 What is AH?
AN CO3
14 Differentiate transport mode and tunnel mode in IPSecurity.
CO3
15 R
List the application of IPSec
A CO3
16 What is IKE?

PART- B & C
Discuss the working of IPSec and what the benefits of IPSec
1 U CO3
are.
Describe IPSec protocol with its components and security CO3
2 services. R
Describe IEEE 802.1X port-based network access control. CO3
3 U
Describe IPSec architecture. CO3
4 A
CO3
5 Discuss application of IPSec and benefits of IPSec. U

CO3
6 AN
Briefly explain transport layer security.
CO3
7 Explain in detail about SSL. R

CO3
8 Describe Secure Shell and Its applications. R

UNIT – IV – APPLICATION LAYER SECURITY

Q. No. Questions BT CO

PART–A
Why does PGP generate the signature before applying A
1 compression? CO4
A CO4
2 What is MIME?
A CO4
3 What is S/MIME?

Why is segmentation and reassembly function in PGP A CO4


4
needed?
A CO4
5 What are the different types of MIME?
List out the services provided by PGP. R CO4
6

AN CO4
7
What do you mean by PGP?
8 CO4
What are the five principal services provided by PGP? A
CO4
9 R
Mention the five header files defined in MIME?
CO4
10 R
Define mobile service security.
11 CO4
What is E-mail compatibility in PGP? A
CO4
12
How does PGP use the concept of trust? C
13 CO4
List the S/MIME functionality. R
U CO4
14 What is ESS in wireless Network Security?
U CO4
15 What is PEM?

R CO4
16 What is device security in wireless network security?
R CO4
17 What is rapid security?

PART- B & C

U CO4
1 Briefly Explain Electronic mail security.

CO4

2
How PGP achieve authentication and confidential Explain?

C
Explain the PGP message format in detail. U
CO4
3

Describe s/MIME in detail. U


CO4
4
Explain DKIM with necessary flow diagram. CO4
5 U
CO4
6 Explain in detail about wireless network security.
U
U CO4
7 Describe mobile device Security.
CO4
8 Describe PEM and its message processing.
U

Discuss the general procedure for S/MIME message U


CO4
9
preparation.

UNIT – V – SECURITY PRACTICES

Q. No. Questions BT CO

PART–A

1 What is an intruder? A CO5

2 CO5
What is intrusion detection system? A
What are the design goal of firewall? CO5
3 A
List the limitations of firewall. CO5
4 R
5 CO5
What is virtual private network? A
6 CO5
Who is masquerader and who is clandestine use? R
CO5
7 What are the three main components involved in the U
distribution intrusion detection system?
AN CO5
8 Define Intruder.
R CO5
9 Name three different classes of Intruders.
C CO5
10 Define Intrusion.
U CO5
11 What are the advantages of intrusion detection system over
firewall?
R CO5
12 Define the role of firewall.
13 CO5
List various types of firewall. R
14 CO5
List the various password selection strategies. R
A CO5
15 What are the benefits of intrusion detection techniques?
PART- B & C

What is intrusion detection? And explain the various intrusion CO5


1 detection system. E
U CO5
2 Describe the Architecture of distributed IDS.

U CO5
3 Describe the Intrusion prevention system in detail.
U CO5
4 Explain statistical anomaly detection and rule based intrusion
detection.
Illustrate the common types of firewalls with diagrams. CO5
5
R
Describe the firewall configuration. CO5
6 U
Discuss how firewall help in the establishing the security CO5
7 U
frame work for an organization?
8 U CO5
Describe block chain technology.
U CO5
9 Describe cloud security and IOT security.

You might also like