Sei sulla pagina 1di 3

Year : 2014-2015

UNIT V

Sem.: EVEN

NETWORK SECURITY
Subject Code:

NE 7202

Branch

ME-CSE

Subject Name:

NETWORK AND INFORMATION SECURITY

Year/Sem

I/ II

PART A
1. List the important features of Kerberos and the requirements of Kerberos
2. What entities constitute a full-service Kerberos environment?
3. What is the role of Ticket Granting Server in inter realm operations of Kerberos?
4. What was the problem addressed by Kerberos?
5. List three approaches to secure user authentication in a distributed environment
6. Mention the scenario where Kerberos scheme is preferred.
7. What are the technical deficiencies in the Kerberos version 4 protocols?
8. What entities constitute a full-service Kerberos environment?
9. What do you mean by PGP? Draw the Format of PGP Message.
10.How does PGP generate a signature before applying compression?
11.Why R64 conversion useful for email generation?
12.List the services offered by PGP? (May 2013)
13.Draw the general format for PGP message.
14.What are the security options PGP allows when sending an email message?
15.How does PGP use the concept of trust?
16.Why is the segmentation and reassembly function in PGP needed?
17.What is the utility of a detached signature?
18.What is meant by Secure Socket Layer? Write its features
19.Draw the architecture of SSL
20.Mention four SSL Protocols
21.What are the protocols that compromises SSL
22.What is the difference between an SSL Connection and SSL session?
23.What services are provided by the SSL Record Protocol?
24.What is the role of encryption in the operation of a virus?
25.Define intrusion.
26.Define Intruder. Name three different classes of Intruders.
27.What do you mean by Intrusion Detection? List the types of Intrusion Detection System.
28.Define honey pots? What are Honey Pots present in Intrusion Detection System?
29.What is meant by a trusted system?
30.Mention the two levels of hackers.
31.What are the two types of audit records?
32.What are the issues derived by porras about the design of distributed Intrusion Detection
System?
33.What are the main components involved in the distributed Intrusion Detection System?
34.What metrics are useful for profile-based intrusion detection?
35.What are the three benefits that can be provided by IDS?
36.What is the difference between statically anomaly detection and rule-based intrusion
detection?
37.What is meant by HIDS and NIDS?
38.What is meant by Firewall? List three design goals for a firewall.
39.What information is used by a typical packet-filtering router?
40.What are some weaknesses of a packet- filtering router?
41.What is the difference between a packet-filtering router and a stateful inspection firewall?
42.What is meant by circuit level gateway and application gateway.
43.What are the differences among the three configurations of firewall?
44.List four techniques used by firewalls to control access and enforce a security policy.
45.Define: Malicious software. What are the effects of malicious software?

46.What is meant by Virus? Give the types of viruses.


47.List down the four phases of virus.
48.Differentiate spyware and virus.
49.What is a Polymorphic Virus?
50.What is the role of encryption and compression in the operation of a virus?
51.What are the steps involved to remove virus.
52.What is Worm? How does a worm propagate? Give few examples for worms.
53.What are the typical phases of operation of a virus or worm?
54.What do you mean by Trojan Horses?
55.What is difference between Zombies logical bomb?
56.What is meant by Denial of Service and Distributed Denial of Service?

PART B

1. What is Kerberos? Explain how it provides authenticated service?


2. (i). Describe the authentication dialogue used by Kerberos for obtaining required services.
(ii). Explain the format of the X.509 certificate.
3. Compare Version 4 of Kerberos with Version 5 in detail
4. (i)Explain the general format of PGP message(ii).Explain the services of PGP.
5. Describe Electronic Mail Security.
6. Explain PGP message generation and reception.
7. How does PGP provide confidentiality and authentication service for e-mail and file storage
applications? Draw the block diagram and explain its components.
8. Describe the SSL Architecture in detail.
9. Describe the SSL Specific protocol Handshake action in detail.
10.(i)Write short notes on intruders.
(ii)Explain Host based Intrusion Detection Systems and Network based Intrusion Detection
Systems.
11.(i)Explain about intrusion detection techniques in detail. (ii)List the approaches for the
intrusion detection.
12.(i)Explain types of Host based intrusion detection. List any two IDS software available.
(ii)Explain statistical anomaly detection and rule based intrusion detection.(May 2014)
13.Sketch the Honey pot Architecture and explain(May 2012)
14.Explain firewall design principles, characteristics, types and Limitations of firewalls.
15.Explain the different types of firewall and its configurations in detail.
16.(i)Describe packet filtering router in detail.
(ii)What kind of attacks is possible on packet filtering firewalls and suggest appropriate
counter measures.
17.(i)Explain firewalls and how they prevent intrusions.
(ii)What are the positive and negative effects of firewall?
18.Explain about viruses in detail
19.Explain different types of viruses and types of viruses Structures.
20.(i)Write a detailed note on viruses and worms.
(ii)Write about viruses and related threats in detail.
21.Discuss the role of compression in the operation of a virus.
22.List and Brief, the different generation of antivirus software.
23.Describe any two advanced antivirus techniques in detail.

Prepared by:

Verified by:

M.Azhagiri.
Asst.Prof./ CSE

Dr. U.V. Arivazhagu


HOD/ CSE

Potrebbero piacerti anche