Information and Network Security
10IS835
VTU QUESTION BANK
UNIT-I
PLANNING FOR SECURITY
1. Discuss the system specific security policy .How managerial guidelines and technical
(10
marks)
2. Who is responsible for policy management? How a policy is managed. Explain? Responsible
specification can be used in SysSP? (Dec 2015)
individual .(Dec 2015)
3. Explain issue-specific Security policy?(June 2015)
(10 marks)
(10 marks)
4. Draw a systematic diagram showing the major steps in contingency Planning. Explain in
Detail. Business impact analysis.(June 2015)
(10 marks)
5. Explain the Pipkins three categories of incident indicators. (Dec 2014)
(12 Marks)
6. Explain the ISO/IEC 270 01 : 2005 plan-DO-Check-Act cycle. (Dec 2014)
(8 Marks)
7. Define policy and explain issue specific security policy. (June 2014)
8. Explain the importance of incident response planning strategy. (June 2014)
(10 Marks)
(10 marks)
9. Define the terms: Policy, Standards and practices in the context of information security.
Draw a schematic diagram depicting the inter-relationship between the above. (Dec 2013)
(6 Marks)
10. What are the policies that must be defined by the management (of organizations) as per
NIST SP 800-14 ? Describe briefly the specific areas covered by any two of these policies.
(7 Marks)
(Dec 2013)
11. What are the components of contingency planning? Describe briefly the important steps
involved in the recovery process after the extent of damage caused by an incident has
been assessed. (Dec 2013)
Dept of ISE,SJBIT
(7 Marks)
Page 1
Information and Network Security
10IS835
UNIT 2
SECURITY TECHNOLOGY -1
1. Explain the major steps specified in BSS7799:2 document. How these steps help in security
planning (Dec 2015)
(10 marks)
2. What is firewall? Show the working of screened host and dual homed firewall?
(Dec 2015)
(10 marks)
3. Explain the FIREWALL RULES.( June-2015,Jun 2014)
(10 marks)
4. What is VPN and explain the different techniques used to implement the VPN Virtual Private
Network (VPNs) (June 2015,June 2014)
(10 marks)
5. Explain the screened subnet firewall.(Dec 2014)
(10 Marks)
6. What is firewall? Explain categories of firewalls based on processing mode. (Dec 2014)
(10 Marks)
7. What is firewall? Show the working of screened host and dual homed firewall? (Dec 2013)
(10 marks)
8. Describe in brief the different types of security policies (Dec 2013).
(10 marks)
UNIT 3
SECURITY TECHNOLOGY 2
1. What is VPN? Explain the two modes of VPN. (Dec 2015, June 2014)
(10 marks)
2. Differentiate between network based IDS and Host Based IDS emphasizing on their
advantages and disadvantages . (Dec 2015, June 2014)
(8 marks)
3. With the help of schematic diagram explain the centralized control strategy implementation
of IDS. (June 2015).
(6 marks)
4. Enumerates the advantages and disadvantages of using honey pots. (June 2015) (6 marks)
5. How does a signature-based IDPs differ from a behavior based IDPs ?(Dec 2014) (10 Marks)
6. Explain the venerability scanners.(Dec 2014)
Dept of ISE,SJBIT
(10 Marks)
Page 2
Information and Network Security
10IS835
7. Explain network based intrusion detection and prevention system (Dec 2013)
8. Describe the need of operating system detection tools. (Dec 2013)
(10 Marks)
(10 Marks)
9. Define the following terms related to IDS :
i.
Alert
ii.
False attack stimulus
iii.
False negative
iv.
False positive
v.
True attack stimulus (June 2013)
(5 Marks)
10. Discuss the reasons for acquisition and use of IDSs by organizations.(June 2013)(6 Marks)
11. Explain the functionality of a network based IDPS. What are its advantages and
disadvantages.(Dec 2012)
(10 marks)
12. Explain the different ways in which authentication is carried out to achieve access control
(Dec 2012 )
(10 marks)
UNIT 4
CRYPTOGRAPHY
1. What is an intrusion? Briefly write about eight IDPS terminologies. (Dec 2015) (10 marks)
2. What is an encryption? Discuss the asymmetric and symmetric methods. (Dec 2015)
(10 marks)
3. What are the fundamental differences between asymmetric and symmetric encryption
(June 2015)
(6 marks)
4. Explain the different categories of attacks on cryptosystem. (June 2015)
(8 marks)
5. Define the following with relation to cryptography (June 2015)
(6 marks)
6. What are the difference between digital signature and digital certificate ? (Dec 2014)
(10 Marks)
7. Explain the two methods of encrypting plaintext.(Dec 2014)
(10 Marks)
8. List out the elements of cryptosystems and explain transposition cipher technique (June 2014)
(10Marks)
Dept of ISE,SJBIT
Page 3
Information and Network Security
10IS835
9. Who can attack cryptosystems? Discuss different categories of attacks on cryptosystems
(June 2014)
(10 Marks)
10. Define the following with relation to cryptography (Dec 2013)
(6 marks)
11. What is an encryption? Discuss the asymmetric and symmetric methods.(Dec 2013)
(12 marks)
UNIT 5
INTRODUCTION TO NETWORK SECURITY, AUTHENTICATION APPLICATIONS
1. What is meant by information security? Discuss the three aspects of information
security.(Dec 2015)
(10 marks)
2. Briefly explain the four types of security attacks? That are normally encountered. also
Distinguish between active and passive attacks. (Dec 2015)
3. Discuss Active security attack .(June 2015)
(10 marks)
(10 marks)
4. With the help of neat diagram explain the general format of a X.509 public key certificate.
(Jun 2015)
(10 marks)
5. What are the difference between active and passive security attacks ? (Dec 2014)
(10 Marks)
6. Explain the different authentication procedures in X.509 certificate. (Dec 2014)
(10 Marks)
7. With a neat diagram, explain network security model ( June 2014)
(10 Marks)
8. List out the difference between Kerberos version 4 and version 5. (June 2014) (10 Marks)
9. Describe the various security attacks and specific mechanisms covered by X.800
(Dec 2013)
(14 Marks)
10. Explain the different authentication procedures in X.509 certificate.(Dec 2013)
(10 marks)
Dept of ISE,SJBIT
Page 4
Information and Network Security
10IS835
UNIT 6
ELECTRONIC MAIL SECURITY
1.With a systematic diagram explain Kerberos Ver-4 authentication dialogue clearly mention
different steps.(Dec 2015)
(10 marks)
2. With a flowchart explain the process of transmission and reception of PGP message.
(Dec 2015 )
(10 marks )
3. Explain the PGP message generation and reception process.(June 2015)
(10 marks)
4. Explain the different MIME Content types.(June 2015).
(10 marks)
5. With a neat diagram, explain the digital signature service provided by PGP
(Dec 2014)
(10 Marks)
6. Explain the different MIME content types.(Dec 2014)
(10Marks)
7. Explain PGP message generation and PGP message reception techniques.
(June 2014)
(10 Marks)
8. Describe S/MIME Functionality.(June 2014)
(5 Marks)
9. Explain S/MIME certificate processing method. (Dec 2013)
(5 Marks)
10. Describe the steps involved in providing authentication and confidentiality by PGP, with
suitable illusions.(Dec 2013)
(10 Marks)
11. Discuss the limitations of SMTP and how MIME overcomes these Limitation
(June 2013)
(10 Marks)
12. What are the various message header fields and content types in MIME,explain in brief
(June 2013)
(10 marks)
UNIT 7
IP SECURITY
1. Give a general structure of IPSEC Authentication header. Describe how anti reply service is
supported. (Dec 2015)
(10 marks)
2. With a neat diagram explain the basic combination of security association. (Dec 2015)
(10 marks)
3. Mention the application of IPSEC. (June 2015)
Dept of ISE,SJBIT
(4 marks)
Page 5
Information and Network Security
10IS835
4. Explain the security association selector that determine the security policy database entry.
(June 2015)
(6marks)
5. Draw a neat diagram IPSEC ESP format and explain . (June 2015)
(10 marks)
6. Mention the important features of OAKLEY algorithm. (Dec 2014)
(10 marks)
7. Explain the format of an ESP packet in IP security.(Dec 2014 ,June 2013)
(07 Marks)
8. Why does ESP include a padding field?(Dec 2014,June 2013)
(3 Marks)
9. Give an example of an aggressive Oakley key.(June 2013,Dec 2013)
(10 Marks)
10. Describe SA parameters and SA selectors in detail.(Dec 2013)
(10 Marks)
11. Describe the benefits of IPSec.(June 2013)
(5 Marks)
12.Describe the transport and tunnel modes used for IPSec AH authentication bringing out
their scope relevant to IPV4.(June 2013)
(5 Marks)
UNIT 8
WEB SECURITY
1. What is SET? Discuss the requirements and key features of SET. (Dec 2015)
(10 marks)
2. Write short notes on SSL handshake protocol. (Dec 2015)
(10 marks)
3. Explain the parameter that define the session state and connection state in SSL.(June 2015)
(10 marks)
4. Describe the SET participants. (June 2015 )
(5 marks)
5. Explain the construction of Dual signature in SET with neat diagram. Also show its
verification with merchant and the bank. (June 2015)
(5 marks)
6. Explain the dual signature in SET protocol. What is its purpose?
(Dec 2014)
(10Marks)
7. Explain the different alert codes of TLS protocols.(Dec 2014)
(10 Marks)
8. Explain SSL handshake protocol with a neat diagram.(June 2014)
(10Marks)
9. List out the key features of secure transaction and explain in detail.(June 2014)
(10 Marks)
10. Discuss the SSL protocol stack.(Dec 2013)
(10 Marks)
11. What are the service provided by SSL record protocol? Describe the operation of this
protocol.(Dec 2013)
Dept of ISE,SJBIT
( 08 Marks)
Page 6