IAT-2 Syllabus and Question Bank CNS 2023-24 (1).pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Don Bosco Institute of Technology Department of Information Technology Syllabus and Question Bank for IAT-2 Class : TE Sem - 5 Subject – ITC502 CNS Subject Incharge : Ms. Aruna Khubalkar Syllabus : Module – II (Hashing techniques onwards), II...

Don Bosco Institute of Technology Department of Information Technology Syllabus and Question Bank for IAT-2 Class : TE Sem - 5 Subject – ITC502 CNS Subject Incharge : Ms. Aruna Khubalkar Syllabus : Module – II (Hashing techniques onwards), III, IV and VI Module – II (Hashing techniques onwards) 1. What is Hashed Message Authentication Code? How is it generated? 2. What is SSO? Explain Kerberos Authentication protocol (KAP). 3. Explain Kerberos with a neat diagram. 4. What is Digital Signature. Explain how it is created at sender end and retrieved at receiver end. 5. With reasons explain the different security services provided by Digital Signature. 6. What is Digital Certificate. Explain the generation and verification of Digital Certificate. 7. Differentiate Digital Signature and Digital Certificate. Module – III 1. What is Malware? Explain any two malware attacks with their preventive measures. 2. Short notes on Virus worms Trojan horse Backdoors Phishing 3. Explain DOS and DDOS attacks. Module – IV 1. What is the need of SSL? Explain all phases of SSL Handshake protocol in detail with diagram. 2. List the different services provided by SSL. 3. Differentiate SSL and IPSEC protocols. 4. Differentiate AH and ESP. 5. List different protocols of SSL and explain 4 phases of Handshake Protocol. 6. Explain the working of IPSEC in its different modes. 7. Differentiate transport and tunnel mode. 8. Explain Secure Email and S/MIME. Module – VI 1. What is firewall. Explain its 3 design goals/ principles. 2. State capabilities of a firewall and its limitations. 3. Explain 4 types of firewalls. 4. Give an advantage and disadvantage for each type of firewall. 5. What is the need of Intrusion Detection System? How signature-based IDS and Anomaly based work? 6. Give an advantage and disadvantage for each type of IDS - signature based and anamoly based. NOTE : Questions can be asked differently for 2 marks.

Use Quizgecko on...
Browser
Browser