Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Roll number: ___________

Unique Paper Code :


Name of the Course : Post Graduate Diploma in Cyber Security and Law
Name of the paper :
Semester : I
Duration : 2 Hours
Maximum Marks : 40

Instructions for Candidates

1. Write your Roll No. on the top immediately on receipt of this question paper.

2. Attempt any four questions out of 6 questions.

3. Parts of a question must be answered together

Q.1 (a) Explain the difference between LAN, WAN, MAN and WLAN? (2)

(b) Explain the concept of IP subnetting and its importance in network (2)
administration. Describe the process of subnetting an IP address range and
provide an example of how subnetting can be used to optimize network
addressing and improve network performance?

(c) Explain the role of DNS in computer networks and internet communication. (1)

(d)10. Discuss the role of proxy servers in network communication and list two (2)
advantages of using a proxy server.

(e) Differentiate between the OSI model and the TCP/IP model. Highlight the (3)
key differences and similarities between them.

Q.2 (a) Explain the concept of Virtual Private Network (VPN) and discuss two (2)
common types of VPNs.

(b) Describe a tunneling protocol used in VPNs and discuss its role in secure (2)
data transmission.

(c) Discuss the Encapsulating Security Payload (ESP) protocol and its (2)
significance in IPsec.
(d) You are tasked with implementing a Virtual Private Network (VPN) for a (3)
company with multiple branch offices.

(e) Define routers and switches in the context of network infrastructure. (1)

Q.3 (a) What is Wireshark? How does it facilitate packet analysis? Discuss two key (2)
features of Wireshark that aid in packet inspection and troubleshooting.

(b) What is vulnerability scanning? Explain the role of Nessus and OpenVAS in (2)
vulnerability assessment. Compare and contrast these two tools.

(c) Discuss the concept of system hardening. Provide three examples of secure (2)
system configurations that can help mitigate security risks.

(d) What is SSL stripping? How does it work, and what are its implications for (2)
network security? Discuss two methods to mitigate SSL stripping attacks.

(e) Define VoIP pentesting. Discuss the unique security challenges associated (2)
with VoIP networks and two common VoIP attack vectors.

Q.4 (a) Discuss common router attacks, such as DNS hijacking and router (3)
compromise, and their potential impact on network security. Outline three
best practices for securing routers against attacks and unauthorized access.

(b) Explain the concept of DNS poisoning. Discuss how DNS poisoning attacks (3)
can be used to redirect users to malicious websites. Provide an example
scenario illustrating the impact of a successful DNS poisoning attack

(c) Outline the countermeasures and best practices for mitigating DNS poisoning (2)
attacks

(d) Explain the concept of denial-of-service (DoS) attacks. Discuss the (2)
characteristics and objectives of DoS attacks, including service disruption
and resource exhaustion. Provide examples of common DoS attack vectors.

Q5 (a) You are conducting a security assessment of a target network using Nmap. (4)
Describe the process of performing a comprehensive port scan using Nmap,
including the options and parameters used for detecting open ports, filtered
ports, and service versions.
(b) What is the primary purpose of OS detection in network reconnaissance? (2)

(c) Discuss the importance of Metasploit scripting in penetration testing and (2)
exploit development.

(e) Describe the steps involved in performing OS detection using Nmap. (2)

Q.6 (a) Define "filtered" ports in the context of Nmap scanning results. (2)

(b) How does Nmap perform service detection and version enumeration? (3)

(c) What countermeasures can organizations implement to protect against (3)


network exploitation using Metasploit?

(d) Describe the role of the Metasploit Framework in network exploitation. (3)

You might also like