SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST Sr. Questions: No

M

Paper

Chapter 1: INTRODUCTION 1 2 3

Give one major difference between a passive and an active attack. Name the technique to be used for protecting against active attacks. Explain Non repudiation with example.

1 1 2

4

5 3

Jun’13

6 7 8 9 10 11 12 13

Differentiate between Specific & Pervasive Security Mechanism. List down the Specific and Pervasive Security Mechanism. List and explain the technique to be used for protecting against active attacks. Explain giving examples Active Attacks and Passive Attacks. Differentiate between Security Mechanism and Security Service. Differentiate between Security Threat and Security Attack. At Which Layer of OSI model the SSL (TLS) protocol works? What is OSI security architecture? List and explain Program (S/w) Threats. Explain Authentication. Explain Data Integrity

Dec’11 Dec’11 Dec’11 Jun’12 Dec’12 Jun’13

7 2 2 2 3 2 2 3

14 15 16

Explain Access Control Explain Data Confidentiality. Explain Denial of Service

1 2 1

17 18 19 20 21 22 23 24 25

Explain Hacking. Define traffic padding. List the security services provided in OSI network model. Explain giving examples Active Attacks and Passive Attacks. Example of Replay attack Write who Masquerader is Explain what a denial of service attack is Explain Security Mechanisms in detail. List software attacks.

2 1 3 4 1 1 1 7 1

Jun’12 Jun’12 Jun’12 Jun’13 Jun’13 Jun’13 Jun’13 Jun’12 Dec’13 Jun’13 Jun’12 Jun’12 Dec’13 Jun’12 Dec’12 Jun’13 Jun’13 Dec’13 Dec’13 Dec’13 Jun’14 Jun’14

2 2 1

Jun’13 Jun’13 Jun’13

7 7

Dec’11 Jun’13

5

4 5

What are the essential ingredients of symmetric cipher? What are the two basic functions of Encryption? How many keys are required for two people to communicate via symmetric cipher? Explain cipher block chaining mode with example. Compare DES, 3DES and AES

Bhargavi Goswami

Network Security

[email protected]

Page

1 2 3

1

Chapter 2: SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

8 9 10 11 12 13 14 15 16 17

18 19

20 21 22 23 24 25 26 27 28 29 30

Why is middle portion of 3DES is decryption rather than encryption? Why some block cipher modes of operation only use encryption rather than encryption and decryption both? What is the difference between a session key and master key? What is the advantage of Key Distribution? Encryption is many times misused to attach the system. Justify. Write a note on AES Algorithm. Give major reasons why AES was introduced even though Triple DES was already there. Explain brute Force attack by giving time requires to attack brute force attack. Explain Feistel Cipher Structure including Feistel Cipher Design Elements. Write a note on RC4 Algorithm with encryption process, overview and security. Write a note on Cipher Feedback (CFB) and Counter (CTR) Mode with Advantages & Limitations. Define: a) Session Key b) Permanent Key? c) KDC d) SSM

2 2

Jun’13 Jun’13

2 2 3 7

Jun’13 Jun’13 Jun’13 Jun’13

3

Jun’13

7

Jun’13

7

Jun’13

7

Jun’13

4

Mention and very briefly explain any three design features/parameters considered while designing a symmetric block cipher. Give 2 major difference between a stream and a block cipher

3

Jun’12 Dec’13 Dec’13

For a Feistel cipher structure, explain terms block size, key size, number of rounds, subkey generation algorithm, round function, fast software encryption-decryption and ease of analysis. Mention the two major reasons why AES was introduced even though Triple DES was already there. Define Cryptography What is the difference between link and end-to-end encryption? How diffusion and confusion is achieved in DES (Data Encryption Standard)? Explain single round of DES algorithm. (hint: internet) Why mode of operation is defined? Explain any two cipher block modes of operations. Differentiate symmetric and asymmetric encryption List the parameter to be considered while designing symmetric block cipher. Explain single round of DES algorithm. Define the Caesar cipher and encrypt the message “this is my last exam”. Example of Encryption Explain how 3DES works. Why it works on EDE mode rather than EEE mode? Explain terms cryptanalysis and brute force attack.

7

Dec’11 Dec’13 Dec’11

2

Jun’12

1 2 7

Dec’12 Dec’12 Dec’12

7 3 7

Dec’12 Jun’13 Jun’13 Jun’13

3

Jun’13

1 3

Dec’13 Dec’13

3

Dec’13

Bhargavi Goswami

Network Security

1

[email protected]

Page

6 7

2

IMPORTANT QUESTIONS LIST

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 31 32 33 34 35 36

3 3 3 4 3 5

Dec’13 Dec’13 Jun’14 Jun’14 Jun’14 Dec’11

Diffie Hellman is vulnerable to man in the middle. Prove. What is a hash function? What is additionally required in a hash function to be used for authentication? What is HMAC? What is its use. “Arrival of Asymmetric key cryptography has made Symmetric key cryptography obsolete.” State True/False with reason. Mention and briefly explain any five properties necessary for a hash function to be useful for message authentication. Just by using a schematic diagram, show how authentication can be achieved in public key cryptography. Assume that confidentiality is not required. List 3 approaches to Message Authentication. Explain HMAC. Write any two objectives for HMAC design. Compare SHA1, SHA256, SHA384, SHA512. List HMAC Objectives. Use of Public Key Cryptography. Differentiate between private key and secret key. Explain Diffie-Hellman Key Exchange. What is digital signature (DSS). Give example.

2 1 2

Dec’11 Dec’11 Dec’11

3 2

Dec’11 Jun’12

5

Jun’12

2

Jun’12

3 5 3 2 2 2 7 2

Explain RSA in detail. Explain Elliptic Curve Cryptography. Explain Public Cryptography Principles. Show its structure, its ingredients, essential steps, applications and state its requirements. Explain MAC and One way Hash Function. Define: Relative Prime Number and MAC Explain Euler’s totient function (Hint: Book Pg. No. 83) What are three broad categories of applications of public-key cryptosystems? What requirements must a public key cryptosystems fulfill to be a secure algorithm? List the steps of RSA algorithm.

7 2 7

Jun’13 Dec’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Dec’11 Dec’12 -

7 2 1 3

Dec’13 Dec’12 Dec’12 Dec’12

4

Dec’12

Give two reasons of choosing AES over 3DES Explain what cipher feedback mode is with example. Compare DES, 3DES & AES Explain types of attacks on encrypted message Explain Key Distribution How pseudo random function is calculated? How pseudo random function is used in the calculation of secure hash function and other information?

4 5 6 7

8 9 10 11 12 13 14 15 16 17 18 19 20 21 22

23

Bhargavi Goswami

Network Security

[email protected]

Page

1 2 3

3

Chapter 3: PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 24 25 26 27 28 29 30 31

32 33

34 35 36 37 38 39 40 41 42 43 44

What is the difference between direct and arbitrated digital signature? Explain the Digital Signature algorithm. What is a message authentication code? Briefly explain the HMAC algorithm. Briefly explain Diffie-Hellman key exchange. Justify that Diffie Hellman key exchange is vulnerable to man in the middle attack. What characteristics are needed in a secure hash function?

7

Dec’12

7

Dec’12

7

Dec’12

2

What is the difference between weak and strong collision resistance? Explain the general structure of secure hash functions. What is digital signature? What are the properties a digital signature should have? What are the applications of public-key cryptosystems? What requirements must a public key cryptosystems fulfill to be a secure algorithm? Briefly explain Diffie-Hellman key exchange. Justify that Diffie Hellman key exchange is vulnerable to man in the middle attack. In a public key system using RSA, the cipher text intercepted is C=10 which is sent to the user whose public key is e=5, n=35. What is the plaintext M? Message Authentication Code Example of Authentication Example of Collision in hash function Write two important advantages of public key cryptography over shared secret key based cryptography Explain why one-way property of secure hash function is important to observe. Explain the process of HMAC calculation from message Show how Diffie-Hellman is vulnerable to man in the middle attack. Mention the applications for public key cryptosystem. Explain public key encryption structure. Explain three approaches to Message Authentication. Why are biometrics used for authentication?

2 3 4

Dec’12 Jun’13 Dec’12 Dec’12 -

4

Jun’13

7

Jun’13

4

Jun’13

1 1 1 3

Dec’13 Dec’13 Dec’13 Dec’13

3

Dec’13

3 3 2 5 7 1

Dec’13 Dec’13 Jun’14 Jun’14 Jun’14 Jun’14

5

Jun’12

1 1 5 3

Dec’11 Dec’11 Jun’13 Dec’11

2 3 4 5

Mention and very briefly explain any five fields/elements of the format of X.509 Public Key Certificate. What is the significance of Nonce in Kerberos? Why Kerberos need a ticket granting server? Differentiate between Kerberos version 4 and version 5. Explain fields Serial Number, subject name and extensions for public key cryptography.

Bhargavi Goswami

Network Security

[email protected]

Page

1

4

Chapter 4: KEY DISTRIBUTION AND USER AUTHENTICATION

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

7 8 9 10 11 12

13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

Mention and very briefly explain any five fields/elements of the format of X.509 Public Key Certificate. Explain X.509 Authentication Service. Explain format. List requirements of Kerberos. Explain Kerberos version 4 without realm. Explain Kerberos realm and Multiple Kerberi. Explain Kerberos Version 5. How to get inter realm User’s certificate? Just by using a schematic diagram, show how authentication can be achieved in public key cryptography. Assume that confidentiality is not required. Explain Authentication procedure for one way, two way and three way communication. Explain X.509 version 3. In detail. What is PKIX? Explain architecture, Management Function, Protocols. List different ticket flags for Kerberos. What are three threats associated with user authentication? List three approaches to secure user authentication. What is realm? How is an X.509 certificate revoked? For a user workstation in a typical business environment, list potential locations for confidentiality attacks. (Hint: Pg. No. 99) Briefly explain how the authentication service is provided in distributed environment using Kerberos. What is Kerberos? What problem was Kerberos design to address? Explain the different schemes for the distribution of public keys. Define Ticket (W R T Kerberos) Authenticator (W R T Kerberos) Define Forward Certificate Usefulness of Oakley Key Determination Protocol over Diffi-Hellman Usefulness of Delete Payload in ISAKMP. Example of Encryption system dependence in Kerberos 4 Example of Subject name in X.509 certificate Differentiate between ticket granting ticket and service granting ticket What serial number and issuer name fields signify in X.509 certificate? Write what are roles of Certification Authority, Registration Authority, CRL issuer and repository w r t PKI. What is Kerberos realm? Explain in brief. How cookie exchange helps avoiding clogging attack by Oakley? Show any two differences between Kerberos version 4 and 5.

Bhargavi Goswami

Network Security

5

Jun’13

7 4 7 7 7 7

Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13

5

Jun’13

7 7

Jun’13 Jun’13

7 3 3 2 3 2

Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Dec’12

7

Dec’12

3 7 1 1 1 1 1 1 1 3 3

Jun’13 Jun’13 Dec’13 Dec’13 Dec’13 Dec-13 Dec-13 Dec-13 Dec-13 Dec-13 Dec-13

3

Dec-13

1 3 3

Dec’13 Dec’13 Dec’11 Dec’13

[email protected]

Page

6

5

IMPORTANT QUESTIONS LIST

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 3 3

Dec’13 Dec’13

3 7 7 1 1

Dec’13 Jun’14 Jun’14 Jun’14 Dec’11

4

Jun’13

2

Dec’11

1 5 2

Dec’11 Jun’12 Jun’12

5

Jun’12

2

Jun’12

4 3

Dec’11 Jun’13 Dec’11

5 2 3 2 2 2 3 5 3 3 3

Jun’13 Jun’14 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Dec’13 Jun’13 Jun’13

21

How enveloped data is constructed in SMIME. Write all steps for the Same. What is the need for using both, symmetric and asymmetric keys in construction of EnvelopedData? What is the need of smime-type field in EnvelopedData? Mention and briefly explain the services available in PGP. Which algorithms are used for compression and email compatibility in PGP? Briefly explain the structure/format indicating the different fields of Private Key Ring in PGP. Mention any one algorithm used in PGP for digital signature and message encryption. How PGP constructs a secure mail? Write the steps involved in the process. Site reasons for using Digital Signature(Public Key Encryption) before compression and compression before authentication(Symmetric Encryption). What are the five principal services provided by PGP? What is the utility of detached signature? Why does PGP generate a signature before applying compression? What is radix-64 conversion? How is it used for an email application? Why is R64 conversion useful for an email application? Why is the segmentation and reassembly function in PGP needed? How does PGP provide public-key management? What is RFC 822? List different MIME content types. Example of MIME message What is S/MIME? Write a note on S/MIME Certificate Processing. Show VeriSign Public Key Classes. What is a key ring in PGP?

2

22

What is a clear signed message in SMIME?

2

Dec’11 Dec’13 Dec’11 Dec’13

38 39

40 41 42 43 44

Show the usefulness of nonce in Kerberos dialogs Why the three way handshake in X.509 authentication process require additional message indicating the signed copy of nonce sent by the receiver? Why proposal and key exchange payloads are used in ISAKMP? Explain X.509 Authentication Procedures. Explain Kerberos version 4 in detail. What do you mean by certificate revocation? Give example of Authentication server (w.r.t. Kerberos)

2 3 4 5 6 7 8 9

10 11 12 13 14 15 16 17 18 19 20

Bhargavi Goswami

Network Security

[email protected]

Page

1

6

Chapter 7:ELECTRONIC MAIL SECURITY

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

How PGP constructs a secure mail? Write the steps involved in the process. How enveloped data is constructed in SMIME. Write all steps for the same Explain general Format of PGP Message. What are the five principal services provided by PGP? What is a key ring in PGP? What is a key ring in PGP? Briefly explain the structure/format indicating the different fields of Private Key Ring in PGP. Write full form of PGP. Write steps PGP performs to calculate digital signature of the mail Write clear reasons for PGP to compress after the signature generation process and not before. How SMIME generates EnvelopedData? Write all four steps. Write the purpose of RFC 822 w r t S/MIME Write any two reasons for PGP popularity List all PGP services. List the content of PGP private key ring and explain any one of them Explain PGP Services. Why is r-64 conversion useful for an e-mail application? Give example of Key legitimacy field (w.r.t. PGP)

4

Dec’12

3 4 4

Dec’11 Dec’12 Dec’12 Dec’12

7

Jun’13

1 3 3

Dec’13 Dec’13 Dec’13

3 3 3 3 3 7 1 1

Dec’13 Dec’13 Dec’13 Dec’13 Dec’13 Jun’14 Jun’14 Dec’11

How routers benefit from IPsec? Explain one benefit. Differentiate between transport and tunnel mode in IPsec

1 2

3 4

Explain with example, Anti-replay service (w.r.t. IPsec) Draw ESP format for IPsec and show the need of fields SPI, sequence number, payload data, padding, pad length, next header and authentication data field. How Oakley key exchange protocol improves on Diffie-Hellman? Show what ISAKMP proposal, transfer and notification payloads are used for. Briefly explain the functionality of Tunnel mode for AH, ESP (encryption only) and ESP (encryption and Authentication) What is the reason for having IPSEC even though SSL is already there? Show in a tabular format different security services which are available in ESP (Encryption + Authentication) protocols in IPSEC. Briefly explain “Security Association” in IPSEC. Give examples of applications of IPSec What services are provided by IPSec. What parameter identify SA and what parameter characterize nature of particular SA?

2 7

Dec’11 Dec’11 Jun’14 Dec’11 Dec’11

4 3

Dec’11 Dec’11

6

Jun’12

1

Jun’12

6

Jun’12

2 3 2 3

Jun’12 Jun’13 Jun’13 Jun’13

5 6 7 8 9 10 11 12 13

Bhargavi Goswami

Network Security

[email protected]

Page

1 2

7

Chapter 8: IP SECURITY

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 14 15 16 17 18 19 20 21

List authentication and encryption algorithm used with AH, ESP. What is replay attack? Why does ESP include padding field? List fields of AH. List disadvantage of Diffie-Hellman key exchange algorithm. Explain combination of Security Association in IPSec. Write a note on IPSec architecture. Draw ESP format for IPSec and describe the need of various fields.

2 3 2 1 2 3 5 7

22

What is IPSec? What are the applications of IPSec? Explain the modes of IPSec operations. Uses of Tunnel mode Usefulness of Integrity Check Value in IPsec. Write any two routing applications of IPsec. What Sequence Counter Overflow and Anti-replay window fields mean for an SA? Write any two benefits of IPsec Explain what security association is w r t IPsec. Explain Security Association(3) Explain IPSec Services.

7

Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Dec’12 Jun’13 Dec’12

1 1 3 3

Dec-13 Dec-13 Dec-13 Dec-13

3 3 3 4

Dec’13 Dec’13 Jun’14 Jun’14

Why web security is more important issue today? List at least four reasons for the same. How message authentication code is computed in SSL? What does the ChangeCipherSpec protocol do? What is the need of pseudo random function used in TLS? At which layer of OSI model the SSL (or TLS) protocol works? What is the need of acquirer in SET? Dual signature (w.r.t. SET)

4

Dec’11

2 1 2 1 1 1

What protocols comprise SSL? List and briefly define the parameters that define an SSL session state and SSL session connection. List alert codes of TLS protocol. List parameters that define SSL session state. List of series of messages exchanged between client and server in handshake protocol. What services are provided by SSL Record Protocol? Differentiate between SSL and TLS protocols. List advantages of SET. List SSL handshaking protocol message types. Draw the schematic diagram of SSL protocol stack and briefly explain the purpose of any three SSL protocols.

2

Dec’11 Dec’11 Dec’11 Dec’11 Dec’11 Dec’11 Dec’12 Dec’12

2 2 3

Jun’13 Jun’13 Jun’13

2 3 2 3 5

Jun’13 Jun’13 Jun’13 Jun’13 Jun’12

23 24 25 26 27 28 29 30

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Bhargavi Goswami

Network Security

[email protected]

Page

1

8

Chapter 5: TRANSPORT-LEVEL SECURITY

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32

What is the reason for having SSL even though IPSEC is already there? At which layer of OSI model the SSL (or TLS) protocol works? What protocols comprise SSL? List and briefly define the parameters that define an SSL session state and SSL session connection. What is SET? Explain purchase request and payment authorization processes of SET. What is a dual signature and what is its purpose? Usefulness of Handshake protocol in SSL Usefulness of PRF in TLS Write any two reasons for web security being an important issue for administrators. What are client and server random? Why they are used? Explain what alert codes insufficient_security and export_restriction mean. (pg. no. 158) At which layer SSL or TLS works? What is the difference in message authentication code calculation process in SSL and TLS? Write the steps taken by SSL to calculate master secret. What is the role of function P_hash() in TLS? Explain SSL Architecture & SSL record protocol. Explain ESP protocol in IPSec in detail.

2

Jun’12

1 7

Jun’13 Jun’13

7

Dec’12

3 1 1 3

Jun’13 Dec’13 Dec’13 Dec’13

3 3

Dec’13 Dec’13

1 3

Dec’13 Dec’13

3 3 7 7

Dec’13 Dec’13 Jun’14 Jun’14

Write the principle on which the Intrusion detection is based. What is a honey pot?

1 2

3

Write at least four ways for intruder’s to learn passwords of their victims. List one advantage of Intrusion detection. Differentiate between profile based and threshold detection methods of statistical anomaly detection Differentiate between anomaly detection and penetration identification methods of rule based anomaly detection How Unix manages passwords to make it secure from attackers? What is the problem if bad password list is stored and compared when user enters the password for proactive password checking? Explain how one can use Markov model for proactive password checking. Mention the general guidelines for creating a good password. Just by drawing schematic diagram, show how new password is loaded and existing password is verified in Unix Systems. List 3 classes of intruders. Briefly explain different categories of intruders.

2

Dec’11 Dec’11 Jun’12 Dec’11

1 2

Dec’11 Dec’11

2

Dec’11

3 2

Dec’11 Dec’11

2

Dec’11

3 4

Jun’12 Jun’12

3

Jun’12

4 5 6 7 8 9 10 11 12

Bhargavi Goswami

Network Security

[email protected]

Page

1 2

9

Chapter 9:INTRUDERS

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Why biometrics are used instead of passwords? Benefits of Intrusion Detection System. List access activities of intrusion detection. List audit record fields. What is salt in context of UNIX pwd mngt. 4 techniques to avoid guessable pwd. Proactive password checking Usefulness of Audit record in IDS Use of Salt in password management Example of Heuristic in rule based IDS Write any two methods of learning passwords What are honey pots? How they help learning about attacker activities? What is proactive password checking? Why it is better than other password checking techniques? Explain password selection strategies. Which are the benefits of IDS? Briefly explain the different metrics useful for profile based intrusion detection. Explain: Rule based Intrusion Detection Explain the general format of Intrusion Detection specific audit records. What do you mean by false positive and false negative in Intrusion Detection System?

1 2 2 2 3 4 1 1 1 1 3 3

Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Jun’13 Dec’13 Dec’13 Dec’13 Dec’13 Dec’13

3

Dec’13

7 1 4

Jun’14 Jun’14 Jun’12

5 6

Jun’12 Jun’12

1

Jun’12

1 1 1 6

Dec’11 Dec’11 Dec’11 Dec’11

7

Dec’11

1 1 1 1

Dec’11 Dec’11 Dec’11 Dec’11

6

Jun’12

1

Jun’12

5 6 7 8 9 10 11

Define Trojan horse defense example Stateful firewall What is a packet filtering router? Explain how attacks like 1) IP address spoofing, 2) source routing and 3) Tiny fragments can be carried out on packet filtering routers? What are the counter measures? Write down at least 7 characteristics of a bastion host and explain their need with an example. What is default discard policy in firewalls What is dual home bastion in firewall configuration? Write two rules needed for multilevel trusted systems What is a protection profile in common criteria for Information security evaluation? Mention and briefly explain the different parameters/fields based upon which packet filtering is normally done. Between default discard and default accept policy in packet filtering firewalls, which one is better and why?

Bhargavi Goswami

Network Security

[email protected]

Page

1 2 3 4

10

Chapter 11: FIREWALLS

SHRI SUNSHINE GROUP OF INSTITUTIONS,RAJKOT FACULTY OF COMPUTER SCIENCE Semester 5 : Network Security : 650002

IMPORTANT QUESTIONS LIST 12 13 14 15 16 17 18 19 20 21 22 23 24 25

26 27 28 29 30 31 32 33 34

4 2

Jun’12 Jun’12

1 6

Jun’12 Jun’12

1

Jun’12

3 2 2 2 2

Jun’13 Jun’13 Jun’13 Jun’13 Jun’13

1 2 2 7

Jun’13 Jun’13 Jun’13 Dec’12

7 4

Jun’13 Jun’13

7

Jun’13

1 1 3

Dec’13 Dec’13 Dec’13

3 3

Dec’13 Dec’13

1

Dec’13

6 1 5 2 1

Jun’14 Jun’14 Jun’14 Jun’14 Jun’14

Page

11

35 36 37 38 39

Briefly explain Access Control List and Capability List Briefly explain the “No Read Up” and “No Write Down” rules for Multi-Level Security. What is a state-full inspection firewall? Draw the schematic diagrams of popular firewall configurations/topologies. Differentiate between stand-alone/desktop firewall and enterprise firewall. List three design goals of firewall. What is IP spoofing, who to prevent using firewalls. What is DMZ, Demilitarized Zone? List weakness of packet filtering router. List the difference between packet filtering router and stateful inspection firewall? How is firewall different from intrusion detection system? List two rules enforced by reference monitor. List properties of reference monitor. Explain how attacks like IP address spoofing, source routing and tiny fragments can be carried out on packet filtering routers? What are the counter measures? Discuss different types of Firewalls Discus the techniques used by firewalls to control access and enforce a security policy. Discus the common criteria for Information Technology Security Evaluation Use of Multi-level security Example of A rule in firewall Explain how firewalls provide service and directional control over the content. Explain what a tiny fragment attack is Differentiate between application level gateway and circuit level gateway. Give one reason why firewall has become important component of the security infrastructure. Explain firewall configuration. List types of firewall. Explain Trojan Horse Defense. Explain two rules of multilevel security. Define subject & object with respect to Trusted System.

Bhargavi Goswami

Network Security

[email protected]

shri sunshine group of institutions,rajkot - Dr. Bhargavi Goswami

2 Jun'13. 13 Differentiate between private key and secret key. 2 Jun'13. 14 Explain Diffie-Hellman Key Exchange. 7 Jun'13. 15 What is digital signature (DSS).

469KB Sizes 5 Downloads 185 Views

Recommend Documents

shri sunshine group of institutions,rajkot - Dr. Bhargavi Goswami
2 Jun'13. 13 Differentiate between private key and secret key. 2 Jun'13. 14 Explain Diffie-Hellman Key Exchange. 7 Jun'13. 15 What is digital signature (DSS).

Shri Ramdeobaba College of Engineering & Management, Nagpur ...
Oct 24, 2013 - The college has been rated amongst the top 50 private engineering colleges ... MIS / ERP / Cloud Computing / SAS / E-commerce. Ergonomics ...

Genderknowledge - Lady Shri Ram College
Mar 5, 2014 - Inauguration of Jagori Exhibition - Women and Mobility by. Suneeta Dhar. ... Entrepedia 2014: Entrepreneurial Development Event. Economics ...

Watch Shri Sabarimalai Shri Ayyappan (1961) Full Movie Online ...
Watch Shri Sabarimalai Shri Ayyappan (1961) Full Movie Online Free.MP4.pdf. Watch Shri Sabarimalai Shri Ayyappan (1961) Full Movie Online Free.MP4.pdf.

Watch Shri Sabarimalai Shri Ayyappan (1961) Full Movie Online ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Watch Shri Sabarimalai Shri Ayyappan (1961) Full Movie Online Free (HD 1080P Streaming) DVDrip.MP4.pdf. Watc

Shri Sai Satcharitra -
this, Baba, I ran in haste, prepared bread with my own hands for You and You threw it to a dog without eating a morsel of it; You gave me trouble unnecessarily." Baba replied - "Why do you grieve for nothing? The appeasement of the dog's hunger is th

Penn State Sunshine Fund
Dec 23, 2014 - Associate General Counsel The Pennsylvania State University Fax: 314-363-8469 ... prior request for the same documents. ... affirming the OOR's prior determination against Bagweli, this latest request does not warrant a.

Penn State Sunshine Fund
Dec 23, 2014 - Associate General Counsel The Pennsylvania State University Fax: 314-363-8469 ... Bagwell justifies his new request as something different from the ... determination against Bagweli, this latest request does not warrant a.

Meeting of NFIR with the Railway Minister Shri Suresh Prabhu.PDF ...
Railwaymen, a decision calling for strike in Railways has already been taken in view of ... E-mail :gs@ nfirindia.com; [email protected], website : www.nfirindia.org.

Hello Sunshine!.pdf
Page 1. Whoops! There was a problem loading more pages. Retrying... Hello Sunshine!.pdf. Hello Sunshine!.pdf. Open. Extract. Open with. Sign In. Main menu.

1 SPEECH OF SHRI JOHN MATHAI, MINISTER OF ...
disturbed and the progress of recovery from the ravages of the war is ... owing to the floods in Bihar and the United Provinces, the damage caused .... our balance of payments with the dollar and hard currency countries is .... budget largely as a re

Orders of appointment of Shri Justice Ramalingam Sudhakar, Judge ...
Displaying Orders of appointment of Shri Justice Ramalingam Sudhakar, Judge as Chief Justice of the Manipur (11.05.2018).pdf. Page 1 of 2.

Shri Narendra Singh Tomar inaugurates Heat Hardening ...
Shri Narendra Singh Tomar inaugurates Heat Hardening Pelletisation Unit.pdf. Shri Narendra Singh Tomar inaugurates Heat Hardening Pelletisation Unit.pdf.

1 SPEECH OF SHRI CD DESHMKH, MINISTER OF ...
Government will continue to take all possible steps to maintain and develop the country's export markets. Among such steps I would mention the recent lowering of the export duty on hessian. I see little prospect of any reduction in the volume of our

Shri-Sai-Satcharitra-The-Wonderful-Life-And-Teachings-Of-Shirdi ...
Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Shri-Sai-Satcharitra-The-Wonderful-Life-And-Teachings-Of-Shirdi-Sai-Baba.pdf. Shri-Sai-Satcharitra-T

Sunshine Millions Distaff
Yellow; green 'g'; green 'g' on sleeves. LOPEZ PASCACIO (80 2-16-12 3%). Dkbbr. m. 7 ...... Brdr: Larry Perkins (FL). Trnr: Wolfson Martin D (16 3-4-1 19%).

pdf-1887\ready-reference-treatise-eternal-sunshine-of-the-spotless ...
Try one of the apps below to open or edit this item. pdf-1887\ready-reference-treatise-eternal-sunshine-of-the-spotless-mind-by-raja-sharma.pdf.

eternal sunshine of the spotless mind script pdf
Click here if your download doesn't start automatically. Page 1 of 1. eternal sunshine of the spotless mind script pdf. eternal sunshine of the spotless mind script ...

The Promise of a Healthier You with Nature's Sunshine Vitamin ...
Page 1 of 3. Page | 1. February 10, 2017. Image 1 Changing Habits for the Better: Nature's Sunshine Vitamin Products. In terms of wellness, going all-natural may perhaps be one of the hottest health trends on the. planet. Gone are the days when peopl

SHRI SANT GADGE BABA COLLEGE OF ENGINEERING ... - ECSA
Draw & explain the block diagram of CCTV systems. Also give .... Explain operation of solar cell with neat diagram & hence state advantages & disadvantages of.

SHRI SANT GADGE BABA COLLEGE OF ENGINEERING ... - ECSA
SHRI SANT GADGE BABA COLLEGE OF ENGINEERING & TECHNOLOGY,. BHUSAWAL. Department of Electronics & Communication Engineering. Subject: ...

Shri Narendra Modi Chief Minister Govt of Gujarat ... -
Babubhai Vaghela . Sat, Jun 29, 2013 at 9:44 AM. To: Narendra Modi . Cc: [email protected], ...