NS Ii Mid Q Paper

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

VIDYA VIKAS INSTITUTE OF TECHNOLOGY DEPARTMENT OF CSE & IT SUBJECT: NETWORK SECURITY FACULTY: J.SASI KIRAN/K.

KANTHI KUMAR

1. (a) What are the business requirements for SET? (b) Mention the types of threats on the web? Discuss their consequences and mention the countermeasures? 2. (a) What are two default policies that can be taken in a packet filter if there is no match to any rule? Which is more conservative? Explain with example rule sets both the policies? 3. Explain the working of SSL protocol? 4. (a) What is IPSec authentication header? Explain? (b) Discuss the purpose of SA selectors? 5. (a) Discuss the key elements included in the model of network management used for SNMP? (b) Explain the functional enhancements made in SNMPV2 over SNMPV1 6. (a) How does the encapsulating security payload work? (b) How are the secure keys distributed in IPSec?

You might also like