information and network security

advertisement
QUESTION BANK
10CS835-INFORMATION AND NETWORK SECURITY
Objectives: It is the purpose of this subject to provide a practical survey of network security applications and standards. The
emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards,
especially Internet standards that have been widely deployed.
QUESTION BANK
UNIT1: Planning for security
Sl.No. Questions
Marks
1.
Define Policy and explain issue specific security policy.
10
2.
Explain the importance of incident response planning strategy.
10
3.
Explain the Pipkin’s three categories of incident indicators
12
4.
Explain the ISO/IEC 27001:2005 plan-do-check-act-cycle.
08
5.
Discuss the system specific policy. How managerial guidance
and technical specifications can be used in SYSSP?
10
6.
Who is responsible for a policy management? How a policy is
managed? Explain.
10
7.
Define the terms : Policy ,standards and practices in the context
of information security. Draw a schematic diagram depicting the
inter-relationship between the above.
06
8.
What are the policies that must be defined by the managements
(of organizations) as per NIST SP 800-14? Describe briefly the
specific areas covered by any of these policies.
07
9.
What are the components of contingency planning? Describe
briefly the important steps involved in the recovery process after
the extent of damage causes by an incident has been assessed?
07
10.
Explain the major steps specified in BS7799:2 documents. How
these steps help in security planning?
10
11.
Explain issue specific security policy.
10
12.
Draw Schematic diagram showing major steps in contingency
planning. Explain in detail business impact analysis
10
13.
Explain NSTISSC security model.
05
UNIT 2: SECURITY TECHNOLOGY-1
Sl.No. Questions
Marks
1.
Explain the firewall rules.
10**
2.
Explain the screened subnet firewall.
10
3.
What is a firewall? Show the working of a screened host and
dual homed firewalls.
10
4.
How a firewall can be configured and managed? Give examples.
10
5.
What is firewall? Explain categories of firewalls based on
processing mode.
10
6.
What is VPN? Explain two modes of a VPN.
10
7.
What are VPN? Explain different techniques to implement a
VPN?
10**
8.
What is a firewall? List the type of firewalls categorized by
processing mode. Draw a schematic diagram of a packet
filtering router used as a firewall and explain its function using a
sample firewall rule.
10
UNIT 3: SECURITY TECHNOLOGY-2
Sl.No. Questions
Marks
1.
How a signature based IDPS differ from a behavior does based
IDPs?
2.
Explain the venerability scanners.
3.
What is an intrusion? Briefly write about any eight IDPS
terminologies.
10
4.
Explain network based intrusion detection and prevention
10
.
10
10
5. Describe the need of operating system detecting tools.
10
6. Define the following terms related to IDS:
i)
Alert ii) False attack stimulus iii) False negative iv)
False positive
v) True attack stimulus.
05
7. Discuss the reasons for acquisition and use of IDSs by
organization.
06
8. Discuss the differences between host IDS and network IDS, with
the help of a schematic diagram.
06
9. Define the terms : honey pots ,honey net and padded cells.
03
10. Differentiate between network-based IDS and Host based IDS
emphasizing on their advantages and disadvantages.
08
11 With the help of schematic diagram, explain centralized control
strategy implementation of IDS.
06
12 Enumerate the advantages and disadvantages of using honey
honey pots
06
UNIT 4: CRYPTOGRAPHY
Sl.No. Questions
Marks
1.
What are the differences between digital signature and digital
certificate?
10
2.
Explain the two methods of encrypting plain text?
10
3.
What is an encryption? Discuss the symmetric and asymmetric
encryption methods?
10
4.
List out the elements of cryptosystems and explain transposition
cipher technique.
10
5.
Who can attack cryptosystems? Discuss different categories of
attacks on cryptosystems.
10**
6.
Define the following terms related to cryptography:
1) Algorithm 2) Cipher 3)Key 4) Link encryption 5) Work
factor 6) Plain Text 7) Stenography 8) Work Factor 9)
10**
7.
Summarize RSA algorithm.
In a RSA system , it is given that p = 11, q = 13, r = 7 and M = 5,
Find ciphertext C and also M from decryption
06**
8.
Explain the Diffie – hellman key exchange algorithm.
06**
9.
With a neat block diagram explain the single round of DES
algorithm.
06**
Explain the various modes in which DES can be used for different
applications.
06**
10.
UNIT 5: INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS
Sl.No. Questions
Marks
1.
Describe the terms: authentication, integrity, privacy,
authorization and non repudiation.
05
2.
Discuss the “man-in-the-middle” attack.
04
3.
What are the differences between active and passive security
attacks?
05
4.
Explain the different authentication procedures in X.509
certificate.
09**
5.
Write the summary of Kerberos version five message exchange.
06
6.
What is meant by information security? Discuss the three
aspects of information security.
10
7.
Briefly explain the four types of security attacks that are
normally encountered .Also distinguish between active and
passive attacks.
10
8.
With a schematic figure, explain Kerberos Ver-4 Authentication
dialogue. Clearly mention various steps.
10*
9.
Compare active and passive attacks.
05
10.
With a neat diagram, explain network security model.
07
11.
List out the differences between Kerberos version 4 and version
5
08
12.
Describe briefly the various security attacks and specific
security mechanisms covered by X.800.
14
13.
Describe briefly the authentication procedures covered by
X.809.
06
14.
Describe the steps involved in Kerberos Login and Kerberos
Request for services, with suitable illustrations.
10
15.
Discuss active security attacks
04
16.
Explain the Kerberos ver-4 message exchanges
10
UNIT 6: ELECTRONIC MAIL SECURITY
Sl.No.
Questions
Marks
1.
With a neat diagram, explain the digital signature service
provided by PGP.
10
2.
Explain the different MIME content types.
10**
3.
With flow charts , explain the process of transmission and
reception of PGP messages.
10
4.
Explain PGP Message generation and PGP message reception
techniques.
10**
5.
Describe S/MIME functionality.
05
6.
Explain S/MIME certificate processing method.
05
7.
Describe the steps involved in providing authentication and
confidentiality by PGP, with suitable illustrations.
10
8.
Discuss the limitations of SMTP/RFC 822 and how MIME
overcomes these limitations.
10
UNIT 7: IP SECURITY
Sl.No. Questions
Marks
1.
Explain the format of an ESP packet in IP Security.
07
2.
Why does ESP include a padding field?
03
3.
Give an example of an aggressive 0akley key.
10
4.
Give the general structure of IPSEC authentication header.
Describe how anti reply service is supported.
10
5.
With neat diagrams, discuss the basic combinations of security
associations.
10
6.
Describe SA parameters and SA selectors in detail.
10
7.
Describe Oakley key determination protocol.
10
8.
Describe the benefits of IPSec.
05
9.
What is security association? Discuss briefly the parameters that
are used to define a security association.
05
10.
Describe the transport and tunnel modes used for IPSec AH
authentication bringing out their scope relevant to IPV4.
10
11
Mention Applications of IP Sec
04
12
Explain security association selectors that determine an security
policy database entry
06
13
Draw neat diagram of IP Sec ESP format and explain
05
14
Mention the important features of Oakley Algorithm
05
UNIT 8: WEB SECURITY
Sl.No. Questions
Marks
1.
Explain the dual signature in SET protocol. What is its purpose?
10
2.
Explain the different alert codes of TLS protocols.
10
3.
What is SET? Discuss the requirements and key features of
SET.
10
4.
Write short notes on: 1) SSL handshake protocol 2) SSL alert
protocol.
10
5.
Explain SSL handshake protocol with a neat diagram.
10
6.
List out the key features of secure electronic transaction and
explain in detail.
10
7.
Discuss the SSL protocol stack.
04
8.
What are the services provided by SSL record protocol?
Describe the operation of this protocol, with suitable illustration.
08
9.
What is SET? Discuss its specifications.
08
10.
Explain the parameters that define session state and connection
state in SSL
10
11
Describe SET participants
05
12
Explain the construction of dual signature n SET with a
diagram. Also show its verification by the merchant and the
Bank.
05
Download