Ccs354 Ns Qb
Ccs354 Ns Qb
QUESTION BANK
SUBJECT
CCS354 – NETWORK SECURITY CLASS III YEAR–6th SEM
CODE&TITLE
COURSE IN- 2024-2025
Mr.P.V.SAMUEL DEVAKUMAR AY
CHARGE (EVEN SEM)
Course Outcomes:
CO1 Classify the encryption techniques
CO2 Illustrate the key management technique and authentication
CO3 Evaluate the security techniques applied to network and transport layer
CO4 Discuss the application layer security standards.
CO5 Apply security practices for real time applications.
Blooms Taxonomy:
REMEMBERING UNDERSTANDING APPLYING ANALYSING EVALUATE CREATE
R U A AN E C
UNIT – I - INTRODUCTION
Q. No. Questions BT CO
PART–A
PART- B & C
1 What is message digest? Explain its importance U CO1
Q. No. Questions BT CO
PART–A
What is public key? A
1 CO2
What is public key certificate? A CO2
2
What is symmetric key? A CO2
3
Define password protection. R CO2
4
What is Kerberos? E CO2
5
Show how SHA is more secure than MD5? A CO2
6
What are the certificates revoked in X.509? A CO2
7
What is key distribution center? A CO2
8
What are the advantages of key distribution? A CO2
9
What is key management? A CO2
10
Define session key. CO2
11 R
What is PKI? A CO2
12
What is key distribution? A CO2
13
What is digital certificate? A CO2
14
What is certification authority? A CO2
15
Define Realm. R CO2
16
PART- B & C
CO2
Q. No. Questions BT CO
PART–A
A
1 What is SSH? CO3
What is SSL session? A CO3
2
Which of the two services provided by SSL record protocol? AN CO3
3
What is the purpose of HTTP? A CO3
4
PART- B & C
Discuss the working of IPSec and what the benefits of IPSec
1 U CO3
are.
Describe IPSec protocol with its components and security CO3
2 services. R
Describe IEEE 802.1X port-based network access control. CO3
3 U
Describe IPSec architecture. CO3
4 A
CO3
5 Discuss application of IPSec and benefits of IPSec. U
CO3
6 AN
Briefly explain transport layer security.
CO3
7 Explain in detail about SSL. R
CO3
8 Describe Secure Shell and Its applications. R
Q. No. Questions BT CO
PART–A
Why does PGP generate the signature before applying A
1 compression? CO4
A CO4
2 What is MIME?
A CO4
3 What is S/MIME?
AN CO4
7
What do you mean by PGP?
8 CO4
What are the five principal services provided by PGP? A
CO4
9 R
Mention the five header files defined in MIME?
CO4
10 R
Define mobile service security.
11 CO4
What is E-mail compatibility in PGP? A
CO4
12
How does PGP use the concept of trust? C
13 CO4
List the S/MIME functionality. R
U CO4
14 What is ESS in wireless Network Security?
U CO4
15 What is PEM?
R CO4
16 What is device security in wireless network security?
R CO4
17 What is rapid security?
PART- B & C
U CO4
1 Briefly Explain Electronic mail security.
CO4
2
How PGP achieve authentication and confidential Explain?
C
Explain the PGP message format in detail. U
CO4
3
Q. No. Questions BT CO
PART–A
2 CO5
What is intrusion detection system? A
What are the design goal of firewall? CO5
3 A
List the limitations of firewall. CO5
4 R
5 CO5
What is virtual private network? A
6 CO5
Who is masquerader and who is clandestine use? R
CO5
7 What are the three main components involved in the U
distribution intrusion detection system?
AN CO5
8 Define Intruder.
R CO5
9 Name three different classes of Intruders.
C CO5
10 Define Intrusion.
U CO5
11 What are the advantages of intrusion detection system over
firewall?
R CO5
12 Define the role of firewall.
13 CO5
List various types of firewall. R
14 CO5
List the various password selection strategies. R
A CO5
15 What are the benefits of intrusion detection techniques?
PART- B & C
U CO5
3 Describe the Intrusion prevention system in detail.
U CO5
4 Explain statistical anomaly detection and rule based intrusion
detection.
Illustrate the common types of firewalls with diagrams. CO5
5
R
Describe the firewall configuration. CO5
6 U
Discuss how firewall help in the establishing the security CO5
7 U
frame work for an organization?
8 U CO5
Describe block chain technology.
U CO5
9 Describe cloud security and IOT security.