Ne7207 Nis Unit 5 Question Bank
Ne7207 Nis Unit 5 Question Bank
Ne7207 Nis Unit 5 Question Bank
UNIT V
Sem.: EVEN
NETWORK SECURITY
Subject Code:
NE 7202
Branch
ME-CSE
Subject Name:
Year/Sem
I/ II
PART A
1. List the important features of Kerberos and the requirements of Kerberos
2. What entities constitute a full-service Kerberos environment?
3. What is the role of Ticket Granting Server in inter realm operations of Kerberos?
4. What was the problem addressed by Kerberos?
5. List three approaches to secure user authentication in a distributed environment
6. Mention the scenario where Kerberos scheme is preferred.
7. What are the technical deficiencies in the Kerberos version 4 protocols?
8. What entities constitute a full-service Kerberos environment?
9. What do you mean by PGP? Draw the Format of PGP Message.
10.How does PGP generate a signature before applying compression?
11.Why R64 conversion useful for email generation?
12.List the services offered by PGP? (May 2013)
13.Draw the general format for PGP message.
14.What are the security options PGP allows when sending an email message?
15.How does PGP use the concept of trust?
16.Why is the segmentation and reassembly function in PGP needed?
17.What is the utility of a detached signature?
18.What is meant by Secure Socket Layer? Write its features
19.Draw the architecture of SSL
20.Mention four SSL Protocols
21.What are the protocols that compromises SSL
22.What is the difference between an SSL Connection and SSL session?
23.What services are provided by the SSL Record Protocol?
24.What is the role of encryption in the operation of a virus?
25.Define intrusion.
26.Define Intruder. Name three different classes of Intruders.
27.What do you mean by Intrusion Detection? List the types of Intrusion Detection System.
28.Define honey pots? What are Honey Pots present in Intrusion Detection System?
29.What is meant by a trusted system?
30.Mention the two levels of hackers.
31.What are the two types of audit records?
32.What are the issues derived by porras about the design of distributed Intrusion Detection
System?
33.What are the main components involved in the distributed Intrusion Detection System?
34.What metrics are useful for profile-based intrusion detection?
35.What are the three benefits that can be provided by IDS?
36.What is the difference between statically anomaly detection and rule-based intrusion
detection?
37.What is meant by HIDS and NIDS?
38.What is meant by Firewall? List three design goals for a firewall.
39.What information is used by a typical packet-filtering router?
40.What are some weaknesses of a packet- filtering router?
41.What is the difference between a packet-filtering router and a stateful inspection firewall?
42.What is meant by circuit level gateway and application gateway.
43.What are the differences among the three configurations of firewall?
44.List four techniques used by firewalls to control access and enforce a security policy.
45.Define: Malicious software. What are the effects of malicious software?
PART B
Prepared by:
Verified by:
M.Azhagiri.
Asst.Prof./ CSE