You are on page 1of 2

NSC IMPORTANT

UNIT-I

1. Explain Principle of Security.


2. Explain Substitutions techniques.
3. Explain Transposition techniques.
4. What is threat? Explain different types of threats.
5. Difference b/w symmetric and asymmetric key cryptography.
6. What is cryptography and steganography?
7. Define security attack. Explain various types of attacks.
8. Explain different types of Security services.
9. Explain different types of Security mechanisms.
10. Explain network security model with neat diagram.
11. Explain buffer overflow vulnerability and format string vulnerability.
12. Explain TCP and UDP session hijacking.

UNIT-II

1) Explain principle of block cipher


2) What is triple encryption? Explain 3DES and its application.
3) Explain difference between block cipher and stream cipher.
4) Explain Key Distribution in Symmetric key encryption algorithm
5) Explain DES algorithm.
6) Explain AES algorithm.
7) Explain cipher block modes of operations.
8) Explain difference between AES and DES.
9) Explain fiestel cipher structure.
10)Explain RC4 algorithm.
11)Explain Diffie-Hellman key exchange algorithm.
12)Explain requirements of authentication.
13)Explain about one way hash function.
14)Explain about message authentication code(MAC).
15)Explain Secure Hash Algorithm(SHA).
16)Explain about HMAC
UNIT-III

1. Explain Euclid's algorithms.


2. Explain Euler's & Fermat’s theorem.
3. Explain Chinese remainder theorem.
4. Explain RSA algorithm with example.
5. Explain principle of public key cryptography.
6. Write a short note on digital signature and its approaches. Explain digital signature
algorithm.
7. Write a short note on public key infrastructure.
8. Explain Kerberos.
9. Explain X.509 authentication services.

UNIT-IV
1. Explain about Pretty Good Privacy (PGP).
2. Explain about S/MIME.
3. Explain about IP Security architecture and its header format.
4. Explain IP Security authentication header (AH) and Encapsulation security payload
(ESP).
5. Explain different protocols used in IP Security .Explain Combing Security Association
and key Management Techniques.

UNIT-V

1. Explain requirements of web security.


2. Explain Secure Socket Layer (SSL) and Transport Layer Security (TLS).
3. Explain Secure Electronic Transaction (SET).
4. Explain about Intrusion Detection system with neat diagram.
5. Explain about Trusted systems.
6. Explain different password management strategies.
7. What is virus? Explain different types of viruses and its counter measures.
8. What is firewall? Explain designing goals of firewall.
9. Explain types of firewalls and firewall configuration.
10. What is a worm? Explain types of worms.

You might also like