You are on page 1of 2

1. Explain Operational Security Model for Network Security.

**
2. How Information Security attacks are classified? Give example.
3. What are different security policies? **
4. List differences between security and privacy.
5. Use PlayFair Cipher to encrypt the message “This is columnar
transposition”. Use key – APPLE.
6. Use PlayFair Cipher to encrypt the message “We live in a world full of
beauty”. Use key ‘ANOTHER’.
7. Explain following algorithm modes – ECB, OFB.
8. Explain operation of DES. **
9. Explain monoalphabetic and polyalphabetic cipher example.
10.Find key exchanged between Alok and Bobby. N=11, g=5, X=2, Y=3.
Find value of A, B and secret key K.
11.What is Kerberos? Explain in detail.
12.Given two prime numbers p=17 and q=29 find out N, E and D in RSA.
13.RSA algorithm to encrypt plaintext ''3'' use following parameters p = 11,
q = 3, e = 13.
14.Explain need and implementation of one-way hash function MD5.
15.Define Cryptography, Encryption, Decryption, Plain text, Cipher text &
Cryptanalyst.
16.Explain Passive and Active attacks with examples.
17.What is Cryptanalysis? Explain various Cryptanalysis technique.
18.Write short note on electronic code book.
19.Explain simple columnar techniques with multiple rounds.
20.What is HMAC? Discuss different objectives of HMAC. Explain HMAC
in brief
21.Explain operation of MDS Message digest algorithm.
22.Explain Elliptic curve Cryptography in detail. ***//
23. Describe linear and differential cryptanalysis with suitable example
24.Distinguish between Substitution and transposition ciphers
25.What is Transposition Cipher? Use Transposition Cipher to encrypt the
plain text “WE ARE THE BEST” use key “HEAVEN”
26.Use Transposition Cipher to encrypt plain text ‘I Love my India’ and use
the key ‘HEAVEN’.
27. Explain digital signature standard.
28.What is Block cipher? Explain counter mode of block cipher. **//
29. is Backdoors and Key Escrow in PGP?
30.Describe IPsec protocol with its components and security services.
31.Explain OAKLEY key determination protocol.
32.Explain Secure Electronic Transaction in detail.
33. Describe briefly how IPsec works and enlist its applications. Distinguish
between tunnel and transport mode of IPsec
34.Explain in detail password management practices.
35.What are various types of firewalls? Discuss limitations of firewall. **//
36.Explain need and challenges of intrusion detection system. Define
signature-based IDS. **//
37.Discuss PII confidentiality safeguards. **//
38.What is cyber stalking? How to identify and detect cyber stalking. **//
39.Explain personally identifiable information PII. Describe PII impact
levels with examples **//
40.Write note on Information Protection Law: Indian perspective
41.List and explain various elements of Information security. //
42.Using Hill Cipher encrypt the message ‘ESSENTIAL’. The key for
encryption is ‘ANOTHERBZ’.
43.What is steganography? What are the applications and limitations of
steganography? //
44.What is authentication? Explain various methods authentication. //
45.Explain working of AES in detail. //
46.Discuss the working of IPSec. What are the benefits of IPSec? //
47.What is VPN? Explain types of VPN. //
48.Compare PGP, MIME and S/MIME. //
49.Differentiate between IP-V4 and IP-V6 //
50.Explain secure socket layer handshake protocol in detail. //
51. ISAKMP protocol of IPSec with header format //
52.Explain any two password management practices. //
53.What is trusted system.
54.What is access control security services?
55.Explain packet filtering firewall. //
56. What are different phases of cyber forensics? Explain with suitable
diagram. //

You might also like