You are on page 1of 2

1. List and explain various elements of Information security.

[5]
2. Explain operational Security Model for network security [5]
3. How Information Security attacks are classified? Give example for each [5]
4. What are different security policies? Explain [5]
5. List the difference between Security and Privacy [5]
6. Describe linear and differential cryptanalysis with suitable example. [5]
7. What is steganography? What are the applications and limitations of steganography? [5]
8. Using Hill Cipher encrypt the message ‘ESSENTIAL’. The key for encryption is ‘ANOTHERBZ’.
[5]
9. Use Transposition Cipher to encrypt plain text ‘I Love my India’ and use the key ‘HEAVEN’.
[Use single columnar transposition] [5]
10. What is block Cipher? Explain counter mode of block Cipher. [5]
11. Explain working of AES in detail. [5]
12. Use PlayFair Cipher to encrypt the message "This is a columnar transposition". Use key- APPLE.[5]
13. Explain following algorithm modes [5]
 i) ECB
 ii) OFB
14. Explain the operation of DES algorithm in detail. [5]
15. Explain Monoalphabetic & Polyalphabetic ciphers with appropriate examples. [5]
16. What is Transposition Cipher? Use Transposition Cipher to encrypt theplain text “WE ARE THE
BEST” use key “HEAVEN” [5]
17. Write note on application and limitation of stenography. [5]
18. Explain digital signature standard [5]
19. Describe Elliptic Curve Cryptography [5]
20. What is Block cipher? Explain counter mode of block cipher. [5]
21. Write note on application and limitation of stenography [5]
22. Discuss elliptic curve cryptography in detail. [5]
23. What is block Cipher? Explain counter mode of block Cipher. [5]
24. What is authentication? Explain various methods authentication. [5]
25. Explain working of AES in detail. [5]
26. Find the key exchanged between Alok and Bobby considering following data. [5]
N=11
g=5
X=2, Y=3 Find the value osf A B and secret key K.
27. What is Kerberos ? Explain operation in detail. [5]
28. Given two prime numbers P=17 & Q=29 find out N,E,& D in an R SA encryption process. [5]
29. Explain in details the need & Implementation of one way hash function ( MD5) [5]
30. Discuss the working of IPSec. What are the benefits of IPSec [6]
31. What is VPN? Explain types of VPN [6]
32. Compare PGP, MIME and S/MIME. [6]
33. Differentiate between IP-V4 and IP-V6. [4]
34. Explain secure socket layer handshake protocol in detail [7]
35. Explain ISAKMP protocol of IPSec with header format. [7]
36. What is Backdoors and Key Escrow in PGP? [9]
37. Describe IPsec protocol with its components and security services [8]
38. Explain OAKLEY key determination protocol. [9]
39. Explain Secure Electronic Transaction in detail. [8]
40. Describe briefly how IPsec works and enlist its applications. Distinguish between tunnel and
transport mode of Ipsec [8]
41. What are the various types of firewall. Discuss limitations of firewall. [8]
42. Explain any two password management practices. [4]
43. What is trusted system. [4]
44. Explain need and challenges of intrusion detection system. Define signature based IDS. [8]
45. What is access control security services. [4]
46. Explain packet filtering firewall. [4]
47. List and explain types of intrusion detection system(IDS) [9]
48. Describe screened subnet fire wall architecture. [8]
49. Explain the firewall types with its operation [9]
50. Explain operation of anomaly based intrusion detection system in detail? [8]
51. Describe briefly IPSec work and enlist its application distinguish between tunnel and transport mode
IPSec [8]
52. Explain in detail password management practices [9]
53. What are various types of firewall? Discuses limitation of firewall [9]
54. Explain need and challenges of intrusion detection system . define signature based IDS [8]
55. What is cyber stalking? How to identify and detect cyber stalking. [8]
56. What are different phases of cyber forensics? Explain with suitable diagram. [8]
57. Discuss PII confidentiality safeguards [8]
58. HOW war dialing software are used in remote connectivity? [8]
59. How VoIP hacking is done by attackers ? what are the counter measures for it? [8]
60. What is VLAN jumping? What are countermeasure used for it ? [8]
61. Explain various hacking devices used for hacking [8]
62. Discuss PII confidentiality safeguards. [8]
63. What is cyber stalking ? how to identify and detect cyber stalking. [8]
64. Explain personally identifiable information PII. Describe PII impact levels with examples? [8]
65. Write note on information protection law : Indian perspective [8]

You might also like