Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIT-WISE QUESTION BANK/ PREVIOUS YEAR QUESTIONS (PART A & B)

BTL- Blooms Taxonomy Level:


Level 1-Remembering
Level 2- Understanding
Level 3- Applying
Level 4-Analyzing
Level 5- Evaluating
Level 6- Creating

PART-A& B

S. No Question Marks BTL Couse


Level

PART-A Unit 1
1 What is denial of service attack? 2 2 CO1
2 Discuss about cryptology and cryptanalyst. 2 2 CO1
3 Define Encryption and Decryption 2 2 CO1
4 What are replay attacks? 2 2 CO1
5 Discuss the key range and key size. 2 2 CO1
6 Define Asymmetric key cryptography. Writeits advantages 2 2 CO1
and limitations.
7 Compare substitution cipher with transposition cipher. 2 2 CO1
8 What is the man in the middle attack? 2 2 CO1
9 What is the need of Security? 2 2 CO1
10 What are two basic functions used in encryption algorithms? 2 2 CO1
PART-B Unit 1
1 Write the procedure of play fair cipher and consider the 10 4 CO1
following:2
Plaintext: “PROTOCOL”
Secret key: “NETWORK”
What is the corresponding cipher text using play fair
cipher method?
2 Explain various Security Services in detail. 10 2 CO1
3 List the various substitution cipher techniques and explain 10 2 CO1
any two with example.
4(a) Consider the following: 5 2 CO1
Plaintext: “HAMMER”
Secret key: “PROCEDURE”
What is the corresponding cipher text using play fair cipher
method?
4(b) Compare Symmetric and asymmetric key cryptography 5
5 List out the Principles of Security? Explain in detail 5 2 CO1
6 Discuss about the Security mechanisms. 10 2 CO1
7 What is Steganography? Explain various steganography 5 2 CO1
techniques.
8 Explain the Network security model with diagram. 5 2 CO1
9 Discuss in detail about various types of Security attacks with 5 3 CO1
neat diagrams.
10 Write the procedure of Hill cipher and explain with 5 2 CO1
example.
PART-A UNIT-2
1 What is electronic code Book? 2 2 CO2
2 Define Cipher Based Chaining mode. 2 2 CO2
3 What are the key ingredients of private key cryptography? 2 2 CO2
4 What is the drawback of Diffie and Helman key exchange 2 2 CO2
algorithm?
5 What is the requirements of hash functions? 2 2 CO2
6 Compare stream cipher and block cipher. 2 2 CO2
7 Write about strength of DES algorithm 2 2 CO2
8 What are the principles of public key cryptosystems? 2 2 CO2
9 How to convert block ciphers into stream ciphers? 2 1 CO2
10 Define stream cipher 2 2 CO2
PART-B Unit 2
1 Explain the AES algorithm. 10 3 CO2
2 Consider Diffie-Hellman Scheme with a common prime 10 4 CO2
q=11, and primitive root α=2
a) if user ‘A’ has public key YA=9, What is A’s private
key XA.
b) if user ‘B’ has public key YB=3, What is shared
secret key K .
3 a) Differentiate linear and differential crypto-analysis. 5 3 CO2
b) Describe in detail about Conventional Encryption model 5 2 CO2
4 What is Elliptic Curve Cryptography (ECC)? Discuss 10 3 CO2
ECC algorithm with neat diagram.
5 Briefly explain the characteristics and operations of 10 3 CO2
RC4 Encryption algorithm.
6 Explain DES algorithm with suitable examples. Discuss 10 2 CO2
its advantages and limitations.
7 Explain RSA algorithm with suitable example. 10 2 CO2
8 Discuss about Blowfish. 10 2 CO2
9 a) Draw Feistel cipher structure and explain in detail. 5 2 CO2
b) Perform encryption and decryption using the RSA 5 4 CO2
algorithm for the following
i)p=3, q=11, e=7, M=5
ii)p=5, q=11.e=3, M=9
10 What is block cipher? Explain various block cipher 10 2 CO2
modes of operation with neat diagram.
PART-A UNIT 3
1 What is a digital signature? 2 3 CO3
2 What is Kerberos? How it is used in security? 2 2 CO3
3 What is message digest? 2 2 CO3
4 What properties must a hash function have to be useful for 2 2 CO3
message authentication?
5 Explain Authentication using symmetric encryption 2 2 CO3
6 List three approaches to Message Authentication. 2 2 CO3
7 What are the requirements of authentication? 2 3 CO3
8 What is the standard (notation) used for defining X.509 2 2 CO3
certificate?
9 What is the drawback of authentication approach using 2 2 CO3
symmetric encryption?
10 Write a short note public key infrastructure (PKI). 2 2 CO3
PART-B Unit 3
1 Explain HMAC algorithm. 10 3 CO3
2 Explain Digital signature algorithm (DSA). 10 3 CO3
3 What is biometric Authentication? Explain various 5 2 CO3
biometric authentication techniques.
4(a) Describe various Digital signatures. 10 2 CO3
4(b) Discuss about CMAC. 5
5 Briefly explain about whirlpool algorithm 10 2 CO3
6 Explain approaches for Digital Signatures based on 10 2 CO3
public key Encryption?
7 Write short note on knapsack algorithm. 5 3 CO3
8 State the purpose of secure Hash functions. Discuss 10 2 CO3
secure hash Algorithm with suitable Example.
9 Illustrate X.509 authentication service. 5 2 CO3
10 Describe Kerberos version 4 and its authentication 10 2 CO3
dialogues.
PART-A UNIT – 4
1 What are the various PGP Services? 2 2 CO4
2 What is RFC 822? 2
3 Write a short note on transport mode and tunnel mode. 2 2 CO4
4 What are the different approaches to public-key 2 2 CO4
Management?
5 How does PGP provide public key management? 2 2 CO4
6 Give the features of Authentication Header? 2 2 CO4
7 Explain IP Security. 2 2 CO4
8 Explain about radix64 conversion? 2 2 CO4
9 Show the applications 0f IPSec. 2 2 CO4
10 How MIME is used in email services? 2 2 CO4
PART-B Unit 4
1 Discuss about authentication header. 5 2 CO4
2 Demonstrate combined security association. 5 3 CO4
3 Explain MIME context types. 5 2 CO4
4 Briefly discuss the services provided by Pretty Good 10 2 CO4
Privacy (PGP).
5 What are different cryptographic algorithms used in 5 2 CO4
S/MIME? Explain how S/MIME is better than MIME.
6 Write short note on Pretty Good Privacy. 5 3 CO4
7 Draw and discuss IP Security architecture. 10 3 CO4
8 Write a short note on S/MIME. 5 3 CO4
9 Discuss in detail encapsulating security payload. 5 3 CO4
10 Explain PGP Authentication mechanism with neat 5 2 CO4
diagram.
PART-A UNIT – 5
1 What is cross site scripting vulnerability? 2 2 CO5
2 What are the limitations of firewalls? 2 2 CO5
3 What is secure socket Layer? 2 2 CO5
4 What are different alert codes of TLS protocol? 2 2 CO5
5 How to manage the password? 2 2 CO5
6 Recall the web security considerations 2 2 CO5
7 Define firewall. 2 2 CO5
8 Define Virus. 2 2 CO5
9 What do you mean by Intruder? 2 2 CO5
10 Mention the fields of TLS record format. 2 2 CO5
PART-B Unit 5 CO5
1 Explain secure electronic transaction in detail. 10 2 CO5
2 Briefly discuss about various types of viruses. 5 2 CO5
3 Demonstrate various types of firewalls. 10 3 CO5
4 List and briefly define the parameters that define an 5 2 CO5
SSL session state?
5 What are different services provided by the SSL Record 10 2 CO5
Protocol? Explain.
6 Describe firewall design principles. 5 3 CO5
7 What is intrusion? Discuss intrusion detection system 5 3 CO5
with neat diagram.
8 Recall notes on virtual elections and secure inter-branch 10 3 CO5
payment transactions.
9 Discuss about Secure Socket Layer. 5 2 CO5
10 Explain different virus countermeasure techniques. 5 2 CO5

You might also like