CS707 Network Security Midterm Questions
Q1. Why CIA is essential for Network Security (Lecture-3)
Q2. What are payload. How they can be harmful? Explain with the help of example? (Lecture-5)
Q3. Discuss the strength of the cryptosystem on the basis of different parameters (Lecture-8)
Q4. What are the services provided by cryptosystem (Lecture-8)
Q5. Enlist message service confidentiality, Integrity, Authentication, Authorization, Nonrepudiation (Lecture-8)
Q6. If you are supposed to implement one-time pad encryption scheme, which requirements do you think each pad fulfill so that it is unbreakable? (Lecture-9)
Q7. What are the two basic types of symmetric encryption. Elaborate each with the help of example (Lecture-9)
Q8. What are the two basic functions used in encryption algorithm (Lecture-9)
Q9. What are the attributes that make the symmetric cryptography so powerful? Also give the limitation while using the symmetric key cryptography (Lecture-10)
Q10. Why symmetric algorithm is used in an organization? Give its advantages and drawback. (Lecture-10)
Q11. Differentiate between Secret Key and Private Key (Lecture-10)
Q12. What is public key encryption (Lecture-10)
Q13. What are strengths and weakness of Asymmetric encryption (Lecture-10)
Q14. What are the characteristics of strong stream cipher (Lecture-11)
Q15. What is data encryption standard (Lecture-12)
Q16. Enlist 05 modes of DES (Lecture-12)
Q17. Explain the working of DES (Lecture-12)
Q18. What does it means when an algorithm is broken (Lecture-12)
Q19. Explain Cipher Block Channing mode (Lecture-12)
Q20. Why the middle portion is 3DES Decryption rather than encryption (Lecture-13)
Q21. Briefly describe the features of the Advance Encryption Algorithm (Rijndael)
Q22. Give 05 examples of Symmetric Algorithms (Lecture-14)
Q23. Give 05 examples of Asymmetric Algorithms (Lecture-14)
Q24. What is one way function. How it is implemented in cryptography? (Lecture-16)
Q25. One way function in content of Cryptography (Lecture-16)
Q26. What is ECC Algorithm (Lecture-16)
Q27. What is message authentication codes (Lecture-17)
Q28. Describe CBC-MAC. Which services are provided by CBC-MAC (Lecture-17)
Q29. What CMAM. How it work? (Lecture-18)
Q30. What is CMAC. Define its functionality (Lecture-18)
Q31. What services provided by HMAC (Lecture-18)
Q32. Define digital signature (Lecture-19)
Q33. Define working and diagram of digital signature (Lecture-19)
Q34. What is X.509 Standard (Lecture-21)
Q35. List and briefly describe the posts of Digital Certificates (Lecture-21)
Q36. Define and discuss various components of PKI infrastructure (Lecture-21)
Q37. What are PKI security services (Lecture-21)
Q38. Explain all field of structure of a certificate (Lecture-22)
Q39. What are main components of Kerberos?
Q40. Public Key cryptography uses.
Q41. What is the difference between active attacks and passive attacks
Q42. In context of hashing what is meant by compression.
Q43. What security measures are adopted in the layers of OSI model.
Q44.Risks/Attacks and their measures.
Q45. List and briefly describe the fields that are part of a digital certificate.
Q46. Define and describe the fields of digital certificate.
Q47. What are the characteristics of stream cipher.
Q48. What are the two basic functions used in encryption algorithms.
Q49. How AES encryption works.
Q50. Difference between Kerberos version 4 and version 5.