Question Bank (I scheme)
Name of Subject: NETWORK AND INFORMATION SECURITY
Unit Test: I
Subject Code: 22620
Course: IF/ CM 6I
Semester: VI
Chapter 1: INTRODUCTION TO COMPUTER AND INFORMATION SECURITY (CO1)
2 Marks
1. DEFINE: 1) Vulnerability 2) Threats 3) Assets 4) Counter Measures
2. What is VIRUS? List Different Phases of Viruses
3. What is Computer Security? List needs of Computer Security (any three).
4. Compare Intruders and Insiders (4 Points)
5. Define: 1) Hotfix 2) Patch
6. What is Information .Give importance of information?
PRACTICALKIDA.COM
4 Marks
1. List different types of viruses. Explain any two.
2. List different Types of Attacks .Explain DDOS Attack
3. Explain CIA Security Model with neat diagram.
4. List criteria for classification of Information. Explain any three.
5. Explain 1) Active Attack 2) Passive Attack.
Chapter 2 – USER AUTHENTICATION AND ACCESS CONTROLS (CO2)
2 Marks
1. Define: 1) Authentication 2) Biometrics 3) Access controls 4) Authorization
2. List and Explain password guessing strategies (Any Two).
3. Explain fingerprint in biometric.
4. Explain voice patterns in biometric.
5. Explain Signature & writing patterns in biometric.
4 Marks
1. Explain Authentication Mechanism.
2. List three types of password attack & Explain any Two.
3. Explain given access control Policies: 1) DAC 2) MAC
4. Explain Keystrokes and Handprint in biometrics
Chapter 3 – CRYPTOGRAPHY (CO3)
2 marks
1. Define: a) Cryptography b) Cryptanalysis c) Encryption d) Decryption
2. Define: a) Plain Text b) Cipher Text c) Cryptology d) Steganography
3. Convert Plain text using Caesar’s Cipher method (Shift =3). Plain Text: ABCDEFGHIJKLXYZ
4Marks
PRACTICALKIDA.COM
1) Explain Caesar’s Cipher method and convert given text using Caesar’s cipher (Shift =3)
Text: “Come home tomorrow”
2) Apply simple Columnar Transposition Technique for text “WELCOME COME” and
Key= ZEBRAS
3) Compare Substitution Cipher and Transposition Cipher (4 points)
BHARATI VIDYAPEETH INSTITUTE OF TECHNOLOGY
QUESTION BANK
Unit Test-II (Shift:-I & II)
Program: - Computer Engineering Group Program Code:- CM/IF
Course Title: -Network and Information Security Semester: - Sixth
Course Abbr & Code:-NIS (22620) Scheme: I
--------------------------------------------------------------------------------------------------
Chapter 4: FIREWALL AND INTRUSION DETECTION SYSTEM (CO4)
2 Marks
1. Define firewall and list needs of firewall.
2. List firewall policies
PRACTICALKIDA.COM
3. What is vulnerability assessment?
4. State Anomaly detection
5. Define: Honeypots.
4 Marks
1. Explain DMZ with diagram.
2. What is IDS ? Explain Host Based IDS with diagram .
3. What is IDS ? Explain Network Based IDS with diagram .
4. List types of firewall. Explain Packet Filtering firewall with diagram.
5. List types of firewall. Explain Application Gateways firewall with diagram.
6. List types of firewall. Explain Circuit Gateways firewall with diagram.
7. List types of firewall. Explain Stateful Packet Filtering firewall with diagram.
Chapter 5 – NETWORK SECURITY, CYBER LAWS AND COMPLIANCE STANDARDS (CO5)
2 Marks
1. Define: 1) Cyber-crime 2) PKI (Public key infrastructure)
2. List needs of cyber laws.
3. What is cyber defamation?
4. Define Hacking. List types of Hackers.
5. What is Indian cyber law & list two types.
4 Marks
1. Explain SMTP.
2. List different types of cyber-crime & explain hacking.
3. Explain working of Kerberos with diagram.
4. Explain PGP.
5. Explain ITIL framework .
6. Explain IPsec security with help of diagram.
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM
PRACTICALKIDA.COM