Search This Blog

Network Security's Question Papers!!!

NS:-

These are the questions compiled together from all the previous years' question papers of Network Security. So first try to prepare these topics and then go for the whole book. :-)








  1. Network Security? Principles? Different types of attack on it?
  2. How Key Distribution work with multiple KDC domains? How KDC differs from CA?
  3. Digital Signature? Issued how and by whom?
  4. How is asymmetric key algorithm RSA used to get Digital Signature?
  5. Firewall? Different configuration in which Firewall can be set up? Different types of Firewall?
  6. Digital Certificate? In what circumstances could it be revoked?
  7. Explain Process of Revocation of Certificate?
  8. PKIX or PKCS Infrastructure?
  9. Mutual Authentication? Is it required? Why? Pitfalls?
  10. Explain possible attack on Mutual Authentication i.e. Reflection Attack. Methods taken to foil such an attack?
  11. Explain Security Mechanism used in Electronic Transaction?
  12. Kerberos? Difference between K4 and K5?
  13. Authentication? How can it be achieved with help of tokens?
  14. Explain Symmetric Encryption Algorithm- DES. Broad-level steps and DES Round? What are weak and semi-weak keys used in DES?
  15. Security Policy? Explain different Security Policies?
  16. Hash? Discuss SHA1 and compare with MD5, MD4 and SHA.
  17. Steganography
  18.  Biometric Authentication.
  19. Smart cards
  20. Man in the middle attack
  21. Discuss SET process.
  22. Key principles of Security? Difference: Active and Passive attacks.
  23. Different modes of algorithm? Explain.
  24. E-mail Security
  25. IDEA
  26. Vernam Cipher
  27. Certificate Revocation/Broad level difference between CRL, OCSP and SCVP.
  28. SSL
  29. Different methods used for Authentication. Explain 1.
  30. Methods used for encrypting large messages? Explain 1.
  31. How MD2 Checksum is computed? What is maximum and minimum padding required?
  32. Deffie-Hellman Crypto system? Example.
  33. IP Security.
  34. Advantages/Disadvantages of Symmetric & Asymmetric algorithm? Discuss how advantages of both techniques can be combined to ensure secure key exchange?
  35. Discuss security provided at IP layer in TCP/IP protocol suite.
  36. Different types of attacks a communication system is vulnerable to.
  37. Security policy, Virus, Packet Sniffing.
  38. Difference: SSL and SET.
  39. Intrusion
  40. OFM
  41. Difference: renewable and Postdated Tickets
  42. Smart Cards
  43. How tokens can be used to authenticate an entity?
  44. NOTE: Solve all the RSA numericals as that's the only numerical that comes in QP.
Please comment below as to how do you want the Notes to be uploaded on this site. The answers to these questions first or Unit-wise? 

 Thanks!!!

0 comments: (+add yours?)

Post a Comment