Professional Documents
Culture Documents
NE7202-NIS Unit Wise Qns
NE7202-NIS Unit Wise Qns
NE7202-NIS Unit Wise Qns
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
II SEMESTER
NE7202 – Network and Information Security
Regulation – 2013
Academic Year 2016 – 17
Prepared by
Dr. V.Dhanakoti, Associate Professor / CSE
UNIT I - INTRODUCTION
An Overview of Computer Security-Security Services-Security Mechanisms-Security -Attacks-Access
Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid
policies.
UNIT –I (PART-A)
3 How would you classify passive and active security threats? Analyze BTL-4
4 How would you evaluate the types of security services? Evaluate BTL-5
5 Can you list the different types of security mechanism? Remember BTL-1
6 What elements would you use to relate in access control matrix? Apply BTL-3
Describe Bell-Lapadulla Model-Simple security condition preliminary
7 model Remember BTL-1
12 Distinguish the Lipners uses of Bell-Lapadula model security levels Understand BTL-2
14 Formulate what conclusion you draw in Chinese wall model Create BTL-6
19 How would you apply what you learned in Protection state transitions? Apply BTL-3
How would you compare and substitute the ideas of security policies and
20 types of access control? Create BTL-6
UNIT –I (PART-B)
4 Describe in detail about Access control matrix with examples Remember BTL-1
6 Develop in detail about Clinical information system security policy Create BTL-6
8 Describe in detail about how would you apply Clark Wilson integrity model
and lower water mark policy Remember BTL-1
10 How would you describe in detail about Hybrid policies ? Remember BTL-1
11 (i) List the different types of attacks and explain in detail. (7) Remember BTL-1
UNIT –I (PART-C)
3 How would you explain What is happening when two peoples communicate
via ciphers? Analyze BTL-4
2 Analyze the vignere cipher to encrypt the word cryptography using key
house and decrypt it. Apply BTL-4
3 Develop and Show the DES descrption is,in fact , the inverse of DES
encryption Understand BTL-6
4 Modify and Show that in DES the first 24 bits of each subkey come from the
same subset of 28 bits of the initial key and that the second 24 bits of each Understand BTL-6
subkey come from a disjoint subset of 28 bits of the initial key
17 Show how the public key cryptosystem fulfill the requirements of secure
algorithm? Apply BTL-3
2 Explain in detail about RSA cryptosystems and its attacks Evaluate BTL-5
(i) What approach would you designed to use in EL-Gammal
cryptosystem ? (7)
3 (ii) Develop an El-Gammal scheme with a common prime q=71 and Create BTL-6
primitive root =7. If B has public key YB = 3 and A choose the random
integer k=2 What is the cipher text of M=30? (6)
Distinguish El-Gammal scheme with a common prime q=11 and common
primitive root = 2, k= 2.
4 i. If A has public key Xa =5 What is A’ s private key Ya ? (5) Understand BTL-2
ii. If user B has private key Xb=12 what is B’s public key Yb (4)
iii. What is the cipher text of M=30? (4)
5 Explain in detail about digital signature with suitable diagrams ? Analyze BTL-4
4 Judge the multiplicative inverse of each nonzero elements in Z11 Remember BTL-5
1 (ii) Analyze the function of capabilities and access control list with examples Analyze BTL-4
(6)
2 How would you summarize in detail about identity of the web Understand BTL-2
Describe in detail about what you learned to develop Access control list
3 with examples Remember BTL-1
(i) Analyze the function of capabilities and access control list with examples
(7)
6 Analyze BTL-4
(ii) Explain Anti Cross site scripting Libraries. (6)
UNIT – V (PART-A)
Q.No Question Competence Level
1 Identify the difference between an HTML filter and WAP proxy Remember BTL-1
2 Define the theme of Relam in the context of Kerbroes Remember BTL-1
3 List three approaches to secure user authentication in a distributed
environment Remember BTL-1
9 Classify what are the services provided by the SSL Protocol record Apply BTL-3
UNIT – V (PART-B)
Q. No Question Competence Level
Based on what you know how will you explain the kerbroes version 4 with
1 neat diagram Analyze BTL-4
Can you access the value or importance of pretty good privacy and examine
3 in detail Remember BTL-1
5 What is IDS and describe about various Intrusion detection system Remember BTL-1
How would you show the security flaws caused by viruses and related
8 threats ? Understand BTL-2
9 Will you explain in detail about firewall design principles Evaluate BTL-5
(i) Design firewall with neat design and with examples (6)
10 Create BTL-6
(ii) Explain and Develop a Secret Sharing Schemes (7)
(i) Explain the Firewall design principles. (6)
Analyse
11 (ii) What are viruses? Explain the virus related threats andthe counter measures BTL-4
applied. (7)
(i) Describe the roles of the different serversin Kerberos protocol.How does the
12 user get authenticated to the different servers?(7) Understand BTL-2
(ii) Give briefly about trusted systems.(6)
(i) Estimate what is the role of intrusion detection system? What are the three
benefits that can be provided by the intrusion detection system? (7)
13 Understand BTL-2
(ii) Differentiate between statistical anomaly detection and rule based intrusion
detection system? (6)
(i) Describe the architecture of distributed intrusion detection system with the
necessary diagrams. (7) Remember
14 BTL-1
(ii) List about virus and related threats in detail. (6)
UNIT –V (PART-C)
3 Develop the basic difference between X.509 and PGP in terms of key
hierarchies and key trust ? Remember BTL-6
4 Consider Alice a user of PGP ,How many public keys (N) can Alice have
in order for her to have a duplicate key with probability less than (1-1/e) Evaluate BTL-5