DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

wanderooswarrenAI and Robotics

Nov 21, 2013 (3 years and 7 months ago)

68 views

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CMR TECHNICAL CAMPUS

I


MID INTERNAL EXAMINATION

BTech III Year
-

CSE

Sub: Network Security








Faculty: K. Srujan Raju

UNIT


I

1.

Define

Security attack. Explain in detail about the various types of attacks

which are

vulnerable to

an Internetwork
.

2.

Briefly e
xplain about Security Mechanisms.

3.

Explain TCP session hijacking with Packet Blocking.

4.

Explain about how the Internet standards and RFCs
.

5.

Explain the buffer overflow attack with an example and format string
vulnerability?

6.

Briefly explain abut OSI security Architecture.


UNIT


II


1.

Explain the block cipher modes of operation?

2.

Explain AES algorithm.

3.

(a) What is the difference between a block

cipher and a stream cipher?

(b) What is a product cipher?

(c) Explain the fiestel cipher structure?

4.

Give the structure of HMAC and explain the HMAC algorithm.

5.


Explain the location of Encryption devices to provide network security.

6.

Explain how KDC works
for Symmetric Key algorithms.


UNIT
-

III

1.

De
fi
ne Public key cryptography? Explain with a neat illustration. Give merits

and demerits of the public key cryptography.

2.

With a suitable example show how the Digital Signature provides security.

Also highlight th
e disadvantages of Digital signature.

3.

Explain RSA algorithm with an example.

4.

Explain Kerberos 4 authentication service? Compare and Contrast Kerberos
version 4 and version 5.

5.

Explain X.509 authentication service certificate format.

6.

Explian about key manage
ment in public key cryptosystem.


UNIT


IV

1.

Explain SHA algorithm.

2.

Explain how PGP will provide the security to E
-
Mail.

3.

What is Key exchange? What is its importance? Discuss the Di
ffi
e
-
Hellman

key exchange algorithm.

4.

Discuss the requirement of segmentation

and reassembly function in PGP.

5.

Explain how Radix 64 woks.

6.

Discuss the requirements for Hash function.