Ramrao Adik Institute of Technology, Nerul

You are on page 1of 2

RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL

DEPARTMENT OF INFORMATION TECHNOLOGY


Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

Wei
Que. ghta
Question CO BT
No. ge in
%
1 Discuss with examples the following CO5
a. ARP spoofing
b. TCP SYN flood attack
c. Port scanning 5
d. IP spoofing
e. Honey Pot
f. Packet Sniffing
2 Differentiate between tunnel mode and transport mode of IPSEC CO6 2
protocol. Explain how integrity is achieved
3 List different SSL protocols. Explain in details Handshake protocol. CO6
How does server get authenticated to client. Explain the working of SSL 2
protocol.
4 How IP spoofing leads to Denial of Service(DoS) attack CO5 5

5 Differentiate between Firewall and IDS CO5 5

6 What is the concept of ticket in Kerberos Protocol. CO6 2

7 Compare different types of Firewall. CO5 3

8 What are the roles of different servers in Kerberos protocol. How CO6 2
does a user gets authenticated to different servers
9 What is DoS. List and explain different techniques to perform DoS CO5 5
attack. Explain defense mechanism against DoS.
10 Explain the need of IDS. Differentiate signature based and anomaly- CO5 5
based IDS. State the advantages and disadvantages of both.
11 Explain Secure Email and S/MIME CO6 2
12 Differentiate IPSEC and SSL protocols CO6 2
13 Explain PGP protocol. CO6 2
15 Explain digital signatures schemes CO4 7
a. RSA
b. Elgamal and Schnorr
c. DSS
16 Explain TCP/IP vulnerabilities(Layer-wise) CO5 2
17 Explain Needham Schroeder Authentication Protocol CO4 8

===================================================================
Course Outcomes (CO) Students’ will be able to:
RAMRAO ADIK INSTITUTE OF TECHNOLOGY, NERUL
DEPARTMENT OF INFORMATION TECHNOLOGY
Question Bank - 2
Class / Sem : TE/V Subject: Cryptography and Network Security
Academic year: 2018-19 Div: A&B

CO1- Ability of students to understand aspects of information security.


CO2- Ability of student to understand importance of various security algorithms.
CO3- Ability of students to understand true meaning of Information and Entropy.
CO4- Ability of students to understand aspects of information i.e. compression techniques. CO5- Ability of
students to understand error control techniques
----------------------------------------------------------------------------------------------------------------
Bloom's Taxonomy
BT1- Remember, BT2- Understand, BT3- Apply, BT4- Analyze, BT5- Evaluate, BT6- Create

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy