You are on page 1of 2

Marathwada Mitra Mandal’s Polytechnic,

Thergaon Pune

Question Bank for Final Examination

Bold Questions are very very important questions

Solve following questions 4 marks


1. Describe the need for computer security
2. Explain any four the password selection strategies.
3. Define the following terms:
1) cryptography 2) crypt analysis 3) plain text 4) cipher text.
4. Describe SYN flooding attack with diagram.
5. Define the term virus and describe the different phases of virus.
6. Describe overview of Kerberos with diagram.
7. Draw and explain biometric system.
8. What are the techniques for transforming plain text to cipher text? Explain any one in detail.
9. Describe the working principle of PEM email security.
10. Describe: (i) application patches (ii) upgrades.
11. Consider a plain text “Computer Security” encrypt it with the help of Rail Fence Technique also
write the algorithm.
12. Describe packet filtering router firewall with neat diagram.
13. Describe the following w.r.t. cyber laws: 1) IT act 2000 2) IT act 2008.
14. Describe Caeser’s cipher technique. Write its algorithm with an example.
15. Describe DMZ with suitable diagram.
16. Describe: (i) hacking (ii) cracking.
17. Explain secure socket layer and describe the SSL protocol stack with neat diagram.
18. List any four biometrics methods used for identification. List any four advantages of biometrics.
19. Define Encryption and Decryption with reference to computer security.
20. Explain following terms w.r.t. security : i) Intruders ii) Insiders.
21. What is the application of firewall ? How it works ? Enlist its limitations.
22. Describe in brief : i) Piggybacking ii) Shoulder surfing.
23. What is meant by steganography ? Describe its importance.
24. With the help of neat diagram describe host based Intrusion Detection System.
25. Describe in brief the process of application hardening.
26. Describe rail fence technique. Convert “I am a student” into cipher text using rail fence method.
27. Explain with neat sketch the working of Secure Socket Layer (SSL).
28. Describe the role of individual user while maintaining security. What are the limitations of
following biometrics identification methods. i) Hand print ii) Retina iii) Voice iv) Signature.
29. Describe working principle of SMTP. ii) With neat sketch explain the working of Network Based
IDS.

Maearhwada Mitra Mandal’s Polytechnic,Pune Computer Engineering Department


30. Give IP Sec configuration. Describe AH and ESP modes of IPSEC
31. What is meant by access control. Describe : i) DAC ii) MAC iii) RBAC in brief.
32. Explain Virtual Private Network in brief.
33. Explain model of security with block diagram
34. Explain Cyber crime
35. Define virus. And explain any five types of viruses.
36. Compare symmetric and asymmetric key cryptography.
37. What is software piracy ?
38. Explain DOS and DDOS with neat diagram.
39. Describe dumpster diving with its prevention mechanism.
40. Explain the term stenography with example.
41. Explain e-mail security techniques (protocols).
42. Describe the process of cyber crime investigation.
43. State the types of attacks and describe Active and Passive attack with at least one example each.
44. What is pornography ?
45. What is PGP? How PGP is used for email security.

Solve following questions 6 marks


1. Draw the flow diagram of DES algorithm and explain each step in detail.
2. Define access control and describe DAC, MAC and RBAC access control models.
3. Compare Insider and Intruders of four points and describe who is more dangerous.
4. Describe: (i) man in the middle attack (ii) replay attach with diagrams.
5. Describe the role of people in security.
6. Describe the components of HIDS with neat diagram. State its advantages and disadvantages.
7. What is IP sec? Draw and explain the AH format of IP sec.
8. Describe the following attacks : i) Sniffing ii) Spoofing.
9. Enlist any four cyber crimes. Describe any one in detail.
10. Explain following attacks : i) Man In Middle Attack and ii) Denial Of Service Attack. Also
suggest ways to avoid them.
11. Give characteristics of good password. ii) What is meant by Dumpster diving ? How it is used for
attacking ? Give the ways to avoid/prevent this.
12. Enlist different challenges to be faced while considering computer security.
13. Describe the working of PEM e-mail security & PGP with reference to e-mail security.
14. Give IPSEC configuration. Describe AH & ESP Modes of IPSEC.

Maearhwada Mitra Mandal’s Polytechnic,Pune Computer Engineering Department

You might also like