You are on page 1of 2

AY 2021-2022 (SEM-II)

Question Bank
Subject: - Computer Networks and Security

Unit-3
1. Explain the issues in designing a routing protocol for Ad-hoc Wireless Network.
2. What is Adhoc Network? Explain challenges in designing Routing Protocol for Adhoc
wireless networks.
3. Explain MACAW protocol in details.
4. What are hidden station and exposed station problem in WLAN.
5. Differentiate between infrastructure network and infrastructure less network and What
are issues in Adhoc wireless network?
6. Explain routing protocols in detail.
7. What are the MAC layer and Routing Layer Design goals?
8. Explain the connection establishment and data transfer phase in the following routing
protocols with suitable diagram.
i) AODV
ii) DSDV

Unit-4
1. What is network attack? Write short note on following with suitable example?
a) Active attack b) Passive attack
2. What is stream cipher? Explain encryption process using stream cipher with suitable
example
3. What is substitution cipher? Explain the mono alphabetic and poly alphabetic cipher with
suitable example
4. Describe the following fundamental principles of Information security 1.
Confidentiality & Privacy, 2. Authentication, 3. Authorization and Access Control, 4.
Integrity, 5. Non- repudiation
5. What is Electronic Code book (ECB)? Explain the process of ECB with suitable diagram
6. Describe the following network security threats
a) Unauthorized access b) Distributed Denial of Service (DDoS) attacks c) Man in the
middle attacks
7. What is Cipher Feedback Mode (CFM)? Explain the process of CFM with suitable
diagram
8. What is Cipher Block Chaining (CBC)? Explain the process of CBC with suitable
diagram

Unit-5
1. Explain RSA with suitable example.
2. Explain the working of DES with suitable example.
3. Explain the working of AES with suitable example.
4. Describe how digital signature works with suitable diagrams.
5. Explain Diffie Hellman algorithm with suitable example.
6. Write short note on
a. Hash Functions b) Symmetric key algorithm c) Asymmetric key algorithm
7. Explain the different key establishment schemes
8. Explain the PKIX architecture Model

Unit-6
1. Describe Comprehensive Cyber Security Policy in detail
2. What is the difference between Information security and cyber security? Explain the
different layers of security?
3. What is the difference between hardware attack and software attack? Write a note on
MIM, DoS attack
4. Explain the concept of Cyber Stalking, Cyber Terrorism in detail
5. Write a note on
1. Malware 2. Phishing 3. MIM Attack
6. Elaborate different cyber security policies in brief
7. Explain the different Internet Governance – Challenges and Constraints

You might also like