CNSL Oral Question Bank

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Savitribai Phule Pune University, Pune Third Year Information Technology

(2019 Course)
314456: Computer Network Security Lab
Oral question bank

1. What is a digital signature in the context of cryptography?


2. How does a digital signature differ from a handwritten signature?
3. Explain the purpose and benefits of using digital signatures in secure
communication.
4. What role does the RSA cryptosystem play in digital signatures?
5. Describe the process of generating a digital signature using RSA.
6. How does the verification of a digital signature work in the RSA cryptosystem?
7. What are the key components involved in a digital signature scheme?
8. How does the RSA algorithm ensure the integrity and authenticity of a message
through digital signatures?
9. Discuss the importance of key management in the RSA digital signature scheme.
10. What are the potential vulnerabilities or attacks that can compromise the
security of RSA digital signatures?
11. Can the RSA digital signature scheme provide non-repudiation? Explain your
answer.
12. How does the size of the RSA key impact the security and efficiency of the digital
signature scheme?
13. Are there any limitations or practical considerations when implementing RSA for
digital signatures?
14. Can you explain the concept of a hash function and its role in digital signatures?
15. What are the alternatives to RSA for digital signatures, and how do they compare
in terms of security and efficiency?
16. What is the purpose of implementing a client-server architecture?
17. Explain the basic concept of the client-server model.
18. How would you establish a connection between a client and a server in Python?
19. What is RSA cryptosystem and why is it commonly used for secure
communication?
20. Explain the key generation process in RSA.
21. How would you encrypt a message using RSA in Python?
22. How would you decrypt a message using RSA in Python?
23. What are the advantages of using RSA for secure communication?
24. What are the limitations or challenges of implementing RSA for communication
between a client and a server?
25. How would you handle key management and distribution in the RSA
cryptosystem for secure communication?
DES Algorithm:

1. What is the Data Encryption Standard (DES) algorithm, and what was its
purpose?
2. Describe the basic structure and components of the DES algorithm.
3. How does the DES algorithm use key expansion and permutation to enhance
security?
4. Explain the process of encryption and decryption using the DES algorithm.
5. What is the key length used in the original DES algorithm, and what are its
implications for security?
6. What are the main advantages and limitations of the DES algorithm?
7. Discuss the importance of key management and the role of key schedules in
the DES algorithm.
8. What are some potential vulnerabilities or attacks that can be used against the
DES algorithm?
9. What are some modern alternatives to DES that address its limitations?
10. How has the DES algorithm influenced the development of other
cryptographic algorithms?

Diffie-Hellman Algorithm:

1. What is the Diffie-Hellman algorithm, and what problem does it solve in


cryptography?
2. Explain the concept of public-key cryptography and how it differs from
symmetric-key cryptography.
3. Describe the key exchange process in the Diffie-Hellman algorithm.
4. How does the Diffie-Hellman algorithm ensure secure key exchange over an
insecure channel?
5. Discuss the importance of prime numbers and primitive roots in the Diffie-
Hellman algorithm.
6. Explain the Diffie-Hellman key agreement protocol and how it allows two
parties to establish a shared secret key.
7. What is the role of modular arithmetic in the Diffie-Hellman algorithm?
8. What are the main advantages and limitations of the Diffie-Hellman
algorithm?
9. How does the Diffie-Hellman algorithm contribute to the concept of forward
secrecy?
10. Can you discuss any potential attacks or vulnerabilities against the Diffie-
Hellman algorithm and possible countermeasures?
Snort intrusion detection

1. What is Snort, and what is its primary purpose in the context of network
security?
2. Explain the process of traffic analysis using Snort. How does Snort capture and
analyze network packets?

Socket Programming in C/C++ on Linux. a) TCP Client, TCP Server

1. What is socket programming, and what is its significance in network


communication?
2. Explain the difference between TCP and UDP protocols. Why would you
choose TCP for client-server communication?
3. How do you establish a TCP connection between a client and a server using
socket programming in C/C++?
4. What are the steps involved in setting up a TCP server using socket
programming? How does the server handle multiple client connections?
5. Discuss the process of sending and receiving data between a TCP client and
server using socket programming. How is data transferred and processed on both
ends?
6. Explain the server and client side functions.
7. What is stream socket?
8. What is port?

What is Network Simulator ? which Network Simulator u have used for practical in lab?
Practical list OF CNSL?
Explain RIP , OSPF, EIGRP, DHCP. (Read main points)
Types of different routers, cables used in designing network,
What is Hub, Router, switch .

List of Experiments.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy