CNS Board Exam Suggestion
CNS Board Exam Suggestion
Suggestion
5 set – (1-41)
▪ Theory
1) What do you mean by network security? What are the traditional methods for network
security?
2) Define cryptography. How can cryptography work as a security tool?
3) What do you mean by symmetric and asymmetric encryption a technique? Differentiate
between them.
4) Briefly explain OSI Security Architecture.
5) Briefly explain different types of security services.
6) How can a plaintext can be converted into cipher text? Give example.
7) Explain the symmetric cipher model with its ingredients.
8) Make a comparison/Differentiate between stream cipher and block ciphers with
examples.
9) Define transposition cipher. Why block cipher models are convenient?
10) Why do some block cipher modes of operation only use encryption while others use
both encryption and decryption?
11) Briefly explain cryptanalysis and brute force attacks.
Or, What is brute force attack? Explain various types of cryptanalysis attack with necessary
diagram.
Or, What is brute force attack? Give example of brute-force attack.
12) Define security attack. Briefly explain different types of security attacks.
Or, List and briefly define categories of attack methodologies.
Or, Discuss in a nutshell the different types of security attack with suitable figure.
13) Define encryption. State the applications of the public key crypto system.
14) State and explain the principles of public key cryptography.
15) Compare the security system on public key cryptography and private key cryptography.
16) Differentiate public key and conventional encryption.
17) Distinguish between a session key and a master key.
18) Perform encryption and decryption operation using RSA algorithm for a specific case.
19) Explain Data Encryption Standard (DES) in detail.
Or, Briefly explain general DES encryption algorithm.
20) Why is the middle portion of 3 DES decryption rather than an encryption? Discuss the
strength of DES algorithm.
21) Differentiate between AES and DES algorithm?
22) What is the difference between the AES decryption algorithm and the equivalent
inverse cipher?
23) What was the final set of criteria used by NIST to evaluate candidate AES cipher?
24) What is feistel cipher? How it works in a cryptography algorithm?
Or, Describe the operation of Feistel cipher.
25) What is message authentication? Define the classes of message authentication
function.
26) What do you mean by digital signature? What are properties a digital signature should
have?
27) Briefly explain Diffie-Hellman key exchange.
28) What are the differences between weak and strong collision resistance?
29) What is MIME? List the limitations of SMTP/RFC 822.
30) Define PGP. Why E-mail compatibility function in PGP needed?
31) Define Kerberos. Briefly explain Kerberos v4.
32) Briefly discuss how attacks on password are broadly classified?
33) What is firewall and what are its limitations? Why corporate house implement more
than one firewall for security?
34) Describe MD-5 algorithm in detail. Compare its performance with SHA-1.
35) Draw an analogy between MD5 and SHA algorithm.
Or, Compare between MD5 and SHA algorithm.
36) What is the purpose of X.509 standard? Explain the IPSec architecture.
37) Give the applications & benefits of IP security.
38) State and explain man-in-the middle attack.
39) Define a worm? Diagrammatically illustrate a digital immune system.
▪ Simplification
40) User A & B exchanges the key using Diffie-Hellman algorithm. Assume a=5, q=11, XA =2,
XB =3. Find the value of YA , YB , K.
41) Users A & B use the Diffie-Hellman key exchange technique with a common prime q=71
and a primitive root α =7
(i) If user A has private key XA = 5, what is the A’s public key YA ?
(ii) If user B has private key XB = 12 what is the B’s public key YB ?
(iii) What is the shared secret key?
1 set – (42)