Solution-1
Solution-1
Page 2 of 6
By Hiren Sarvaiya
4) What is IPsec? List out various service provided by IPsec. Draw the architecture of IPsec.
IPsec (Internet Protocol Security) is a framework of protocols that provides secure communication
over IP networks by encrypting and authenticating data. It ensures data integrity, confidentiality, and
authenticity during transmission.
Services :
1. Confidentiality: Protects data by encrypting it, ensuring that only authorized parties can read
it.
2. Data Integrity: Ensures that data is not altered during transmission.
3. Authentication: Verifies the identity of the sender and receiver.
4. Access Control: Restricts unauthorized access to the network.
5. Replay Protection: Prevents attackers from reusing intercepted data packets.
6. Secure Key Management: Manages the encryption and decryption keys securely.
Architecture :
Page 3 of 6
By Hiren Sarvaiya
AH Packet :
7) What is Proxy Server? Explain working and various types of Proxy Servers in detail.
A proxy server acts as an intermediary between a client and the internet. It forwards client requests
to web servers and sends responses back to the client. Proxy servers are used for improving security,
enhancing privacy, and managing network traffic.
Working :
1. A user sends a request (e.g., to access a website).
2. The request first goes to the proxy server.
3. The proxy server processes the request and forwards it to the internet.
4. The web server sends the response to the proxy server.
5. The proxy server delivers the response to the user.
Types :
1. Open/Forward Proxy:
o Routes traffic from clients to any destination on the internet.
Page 4 of 6
By Hiren Sarvaiya
2. Reverse Proxy:
o Acts as an intermediary between clients and a specific server.
Page 5 of 6
By Hiren Sarvaiya
9) Define :
i) Worm :
A worm is a self-replicating malicious program that spreads across networks without needing a host
file. It exploits vulnerabilities to infect systems and often causes network congestion.
ii) Rootkit :
A rootkit is a malicious tool designed to provide unauthorized access to a system while hiding its
presence. It is often used to control and manipulate infected systems.
iii) Keyloggers :
Keyloggers are malicious software or hardware tools that record every keystroke made on a
keyboard. They are used to steal sensitive information, such as passwords or credit card details.
iv) Spyware :
Spyware is malicious software that secretly collects user information without consent, such as
browsing habits or personal data, and sends it to a third party.
v) Backdors :
A backdoor is a hidden method or vulnerability in a system that allows unauthorized access,
bypassing regular authentication mechanisms.
10) Explain SSL Handshake Protocol.
The Handshake Protocol is used to establish sessions. This protocol allows the client and server to
authenticate each other by sending a series of messages. It has four phases to complete its cycle.
Architecture :
1. Phase 1: The client and server exchange "hello" packets to start communication. They share
the cipher suite (encryption method) and protocol version for security.
2. Phase 2: The server sends its certificate and key details to the client. It ends this phase with a
"server hello end" packet.
3. Phase 3: The client sends its certificate and key details back to the server to complete the
exchange.
4. Phase 4: Both sides switch to the agreed encryption method (change cipher suite), ending the
handshake.
Page 6 of 6
By Hiren Sarvaiya