IAT-2 Syllabus and Question Bank CNS 2023-24 PDF

Document Details

Uploaded by Deleted User

Don Bosco Institute of Technology

2023

Ms. Aruna Khubalkar

Tags

computer security information technology cybersecurity syllabus

Summary

This document is a syllabus for an Information Technology course, IAT-2, focusing on Computer Network Security (CNS). The syllabus covers various topics, including hashing techniques, malware, SSL, and firewalls. It's an outline of the course's content for the 2023-24 academic year, organized into modules and detailing potential exam questions.

Full Transcript

Don Bosco Institute of Technology Department of Information Technology Syllabus and Question Bank for IAT-2 Class : TE Sem - 5 Subject – ITC502 CNS Subject Incharge : Ms. Aruna Khubalkar Syllabus : Module – II (Hashing techniques onwards), II...

Don Bosco Institute of Technology Department of Information Technology Syllabus and Question Bank for IAT-2 Class : TE Sem - 5 Subject – ITC502 CNS Subject Incharge : Ms. Aruna Khubalkar Syllabus : Module – II (Hashing techniques onwards), III, IV and VI Module – II (Hashing techniques onwards) 1. What is Hashed Message Authentication Code? How is it generated? 2. What is SSO? Explain Kerberos Authentication protocol (KAP). 3. Explain Kerberos with a neat diagram. 4. What is Digital Signature. Explain how it is created at sender end and retrieved at receiver end. 5. With reasons explain the different security services provided by Digital Signature. 6. What is Digital Certificate. Explain the generation and verification of Digital Certificate. 7. Differentiate Digital Signature and Digital Certificate. Module – III 1. What is Malware? Explain any two malware attacks with their preventive measures. 2. Short notes on Virus worms Trojan horse Backdoors Phishing 3. Explain DOS and DDOS attacks. Module – IV 1. What is the need of SSL? Explain all phases of SSL Handshake protocol in detail with diagram. 2. List the different services provided by SSL. 3. Differentiate SSL and IPSEC protocols. 4. Differentiate AH and ESP. 5. List different protocols of SSL and explain 4 phases of Handshake Protocol. 6. Explain the working of IPSEC in its different modes. 7. Differentiate transport and tunnel mode. 8. Explain Secure Email and S/MIME. Module – VI 1. What is firewall. Explain its 3 design goals/ principles. 2. State capabilities of a firewall and its limitations. 3. Explain 4 types of firewalls. 4. Give an advantage and disadvantage for each type of firewall. 5. What is the need of Intrusion Detection System? How signature-based IDS and Anomaly based work? 6. Give an advantage and disadvantage for each type of IDS - signature based and anamoly based. NOTE : Questions can be asked differently for 2 marks.

Use Quizgecko on...
Browser
Browser