0% found this document useful (0 votes)
53 views11 pages

Question Bank (I Scheme)

The document is a question bank for a Unit Test in Network and Information Security, covering various chapters including Computer Security, User Authentication, Cryptography, Firewalls, and Cyber Laws. It includes both 2-mark and 4-mark questions that require definitions, explanations, and comparisons of key concepts in information security. The content is structured to assess students' understanding of critical topics in the field.

Uploaded by

bhushan wale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views11 pages

Question Bank (I Scheme)

The document is a question bank for a Unit Test in Network and Information Security, covering various chapters including Computer Security, User Authentication, Cryptography, Firewalls, and Cyber Laws. It includes both 2-mark and 4-mark questions that require definitions, explanations, and comparisons of key concepts in information security. The content is structured to assess students' understanding of critical topics in the field.

Uploaded by

bhushan wale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Question Bank (I scheme)

Name of Subject: NETWORK AND INFORMATION SECURITY


Unit Test: I
Subject Code: 22620
Course: IF/ CM 6I
Semester: VI

Chapter 1: INTRODUCTION TO COMPUTER AND INFORMATION SECURITY (CO1)

2 Marks
1. DEFINE: 1) Vulnerability 2) Threats 3) Assets 4) Counter Measures
2. What is VIRUS? List Different Phases of Viruses
3. What is Computer Security? List needs of Computer Security (any three).
4. Compare Intruders and Insiders (4 Points)
5. Define: 1) Hotfix 2) Patch
6. What is Information .Give importance of information?

PRACTICALKIDA.COM
4 Marks
1. List different types of viruses. Explain any two.
2. List different Types of Attacks .Explain DDOS Attack
3. Explain CIA Security Model with neat diagram.
4. List criteria for classification of Information. Explain any three.
5. Explain 1) Active Attack 2) Passive Attack.

Chapter 2 – USER AUTHENTICATION AND ACCESS CONTROLS (CO2)

2 Marks

1. Define: 1) Authentication 2) Biometrics 3) Access controls 4) Authorization


2. List and Explain password guessing strategies (Any Two).
3. Explain fingerprint in biometric.
4. Explain voice patterns in biometric.
5. Explain Signature & writing patterns in biometric.
4 Marks

1. Explain Authentication Mechanism.


2. List three types of password attack & Explain any Two.
3. Explain given access control Policies: 1) DAC 2) MAC
4. Explain Keystrokes and Handprint in biometrics

Chapter 3 – CRYPTOGRAPHY (CO3)

2 marks

1. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption


2. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography
3. Convert Plain text using Caesar’s Cipher method (Shift =3). Plain Text: ABCDEFGHIJKLXYZ

4Marks

PRACTICALKIDA.COM
1) Explain Caesar’s Cipher method and convert given text using Caesar’s cipher (Shift =3)
Text: “Come home tomorrow”
2) Apply simple Columnar Transposition Technique for text “WELCOME COME” and
Key= ZEBRAS
3) Compare Substitution Cipher and Transposition Cipher (4 points)
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK

Unit Test-II (Shift:-I & II)


Program: - Computer Engineering Group Program Code:- CM/IF
Course Title: -Network and Information Security Semester: - Sixth
Course Abbr & Code:-NIS (22620) Scheme: I

--------------------------------------------------------------------------------------------------

Chapter 4: FIREWALL AND INTRUSION DETECTION SYSTEM (CO4)

2 Marks

1. Define firewall and list needs of firewall.


2. List firewall policies

PRACTICALKIDA.COM
3. What is vulnerability assessment?
4. State Anomaly detection
5. Define: Honeypots.

4 Marks

1. Explain DMZ with diagram.


2. What is IDS ? Explain Host Based IDS with diagram .
3. What is IDS ? Explain Network Based IDS with diagram .
4. List types of firewall. Explain Packet Filtering firewall with diagram.
5. List types of firewall. Explain Application Gateways firewall with diagram.
6. List types of firewall. Explain Circuit Gateways firewall with diagram.
7. List types of firewall. Explain Stateful Packet Filtering firewall with diagram.

Chapter 5 – NETWORK SECURITY, CYBER LAWS AND COMPLIANCE STANDARDS (CO5)


2 Marks

1. Define: 1) Cyber-crime 2) PKI (Public key infrastructure)


2. List needs of cyber laws.
3. What is cyber defamation?
4. Define Hacking. List types of Hackers.
5. What is Indian cyber law & list two types.

4 Marks

1. Explain SMTP.
2. List different types of cyber-crime & explain hacking.
3. Explain working of Kerberos with diagram.
4. Explain PGP.
5. Explain ITIL framework .
6. Explain IPsec security with help of diagram.

PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM

You might also like