Information Security
Chapter 1 : Classical Encryption Techniques and DES
Q1. Explain different types of attacks with example ?
Q.2 Explain X.800 Security services?
Q.3 Explain X.800 Security Mechanisms.?
Q4. Explain model of conventional cryptosystem?
Q.5 Explain Play fair cipher with example?
Q6. Explain Transposition Techniques with Examples?
Q7. Explain single round of DES algorithm?
Q8 .Explain Hill Cipher with Example ?
Q.9 Explain a model for network security with neat diagram ?
Q.10 What is substitution technique? Explain Caesar, monoalphabetic cipher ?
Chapter 2 : Public-Key Cryptosystems, Key Management and
Authentication :
Q11. Explain applications and requirements of public key cryptography?
Q.12 Explain RSA algorithm with example ?
Q.13 Write and explain Diffie-Helman Keyexchange algorithm?
Q.14 Explain the distribution of public keys using public-key certificates?
Q.15 what is message authentication code ? What are basics of MAC?
Q16.How message authentication achieved using Hash functions?
Q.17 Explain Man-in-middle attack ?
Q.18 Consider Diffie-Helman Scheme with common prime q=11 and primitive root alpha =2
A. show that 2 is primitive root of 11.
B. If user A has public key YA=9,W hat is A’s private key XA ?
C. If user B has public key YB=3, What is shared secret key ?
Q.19 Explain principals of public key cryptosystems?
Q.20 5How Encryption can be used for message authentication ?
Chapter 3 : Digital Signatures and Authentication Applications:
Q.21 Explain arbitrated and direct digital signature?
Q.22 Exlain RSA and DSS approaches to digital signature?
Q.23 Explain DSA algorithm?
Q.24 Give the overview of kerberos?
Q.25 Explain Difference between kerberos 4 and kerberos 5 ?
Q.26 Explain X.509 certification formats?
Q.27 Define Digital signature? Explain Propertities of Digital Signature?
Q.28 Mention Differences between arbitrated and direct digital signature?
Q.29 Define Kerberos? Explain the Reqirements of Kerberos?
Chapter 4 : Electronic mail and IP security:
Q.30 Explain 5 services of PGP ?
Q.31 What is MIME And S/MIME ?
Q.32 Explain Tunnel and Transport mode of IP Security?
Q.33 Explain antireplay service?
Q.34 Explain Cryptographic keys and keyrings?
Q.35 Explain Applications and Benefits of Ipsec ?
Q.36 Explain overview of IP Security Architecture?
Q.37 Explain AH in Detail.
Q.38 Explain ESP in Detail.
Q.39 Write Short Note on PGP?
Chapter 5 : Web and System Security:
Q.40 Explain SSL Architecture?
Q.41 Explain SSL Record Protocol ?
Q.42 Explain SSL Handshake Protocol?
Q.43 What is SET ? Explain SET Participants and Requirements?
Q.44 What are different classes of intruders and explain with example?
Q.45 Explain Different approaches used for Intrusion detection?
Q.46 What are audit records ? Which fields are present in detection specific audit records.
Q.47 Describe the architecture for distributed intrusion detection system.
Q.48 Explain Different Types of firewalls?
Q.49 Write a short note on trusted systems?
Q.50 Explain different Password Selection Strategies ?
Chapter 6 : Non-Cryptographic Protocol Vulnerabilities:
Q.51 Explain DOS and DDOS attack?
Q.52 Explain ARP Spooing with neat diagram?
Q.53 Explain Pharming Attacks?
Q.54 Write a short note on Phishing?
Q.55 Explain Buffer over flow in detail?
Q.56 Explain Format string attack?
Q.57 Describe SQL injection attack is detail
No comments:
Post a Comment