Ramrao Adik Institute of Technology, Nerul
Ramrao Adik Institute of Technology, Nerul
Ramrao Adik Institute of Technology, Nerul
Wei
Que. ghta
Question CO BT
No. ge in
%
1 Discuss with examples the following CO5
a. ARP spoofing
b. TCP SYN flood attack
c. Port scanning 5
d. IP spoofing
e. Honey Pot
f. Packet Sniffing
2 Differentiate between tunnel mode and transport mode of IPSEC CO6 2
protocol. Explain how integrity is achieved
3 List different SSL protocols. Explain in details Handshake protocol. CO6
How does server get authenticated to client. Explain the working of SSL 2
protocol.
4 How IP spoofing leads to Denial of Service(DoS) attack CO5 5
8 What are the roles of different servers in Kerberos protocol. How CO6 2
does a user gets authenticated to different servers
9 What is DoS. List and explain different techniques to perform DoS CO5 5
attack. Explain defense mechanism against DoS.
10 Explain the need of IDS. Differentiate signature based and anomaly- CO5 5
based IDS. State the advantages and disadvantages of both.
11 Explain Secure Email and S/MIME CO6 2
12 Differentiate IPSEC and SSL protocols CO6 2
13 Explain PGP protocol. CO6 2
15 Explain digital signatures schemes CO4 7
a. RSA
b. Elgamal and Schnorr
c. DSS
16 Explain TCP/IP vulnerabilities(Layer-wise) CO5 2
17 Explain Needham Schroeder Authentication Protocol CO4 8
===================================================================
Course Outcomes (CO) Students’ will be able to:
RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL
DEPARTMENT OF INFORMATION TECHNOLOGY
Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B