You are on page 1of 2

CNS Question Bank

UNIT 1:

1. Explain the Model for Network security with suitable diagram. What is symmetric
and asymmetric cryptography?
2. Explain various types of security attacks in detail
3. What are different substitution cipher techniques. Explain play-fair cipher with
suitable example.
4. Explain following transposition cipher techniques.: 1. Rail fence 2. Single columnar
3. multiple columnar transposition techniques.
5. Explain the following terms: 1. key range annd key size. 2. stenography 3.
possible types of attacks.

UNIT 2:

1. What are different block cipher operation modes, explain in detail


2. Explain RC4 Algorithm with suitable diagram.
3. Explain DES algorithm in detail.
4. Explain RSA algorithm in detail
5. Explain Blowfish Algorithm in Detail
6. Explain Diffie-hellman key exchange with suitable diagram and example.

UNIT 3:

1. What is message Authentication? Explain with suitable diagram.


2. Explain Secure Hash Algorithm (SHA1)
3. What is message authentication code (MAC) and Hash Function? Explain in detail
with suitable diagrams.
4. Explain secure electronic transaction protocol (SET)
5. Explain Authentication requirements and functions in detail.
6. Explain MD5 algorithm in detail.

UNIT 4:

1. Explain SSL (Secure socket layer) protocol with suitable diagrams.


2. Explain security in GSM and 3G
3. Explain Secure electronic transaction protocol in detail
4. Explain 3D secure protocol in detail.
5. Explain HTTPS (Secure HTTP) protocol in detail. Explain difference between HTTP
and HTTPS.
6. Explain Email Security. What is SMTP? Explain.
UNIT 5:

1. Explain Firewall Design principles. What are different types of firewall?


2. Explain Trusted system in details.
3. Explain the following: Intruders, Viruses, and related threats in details
4. Explain Secure electronic transaction (SET) protocol in detail.

UNIT 6:

1. Explain the following: 1. virtual elections 2. Single sign on


2. Explain cross site scripting vulnerability in detail
3. Explain SSL (secure socket layer) in web security.
4. Explain secure multiparty calculations and virtual elections.
5. What is wireless Application protocol (WAP)? explain in detail

You might also like