0% found this document useful (0 votes)
4 views2 pages

Network Security Tutorial Sheet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Network Security Tutorial Sheet

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Department of Computer Engineering Govt Polytechnic

college Larkipora, Anantnag


Assignment-I
Subject: - Network Security Max Marks: …..

Semester: - 5th

NOTE:-

• Assignment to be submitted on 1th of November 2024


• Marks will be deducted after the date of submission.
• The answers are to be written as per exam standards.
• Make a separate A4 size copy for the assignment of the Network Security.
• Write entire questions in neat and clean form.
Unit-I
Q NO 1) What is importance of network security in modern day world? Discus in detail
Q NO 2) What is CIA triad? Explain in detail
Q NO 3) Explain the following in detail with example:-
• Hacking
• Ethical Hacking
• White hat hacker
• Grey hat hacker
• Black hat hacker
Q NO 4) What are the principles of network security ?
Unit-II
Q NO 1) What is active and passive attack ? discuss each in detail
Q NO 2) Explain the following in detail :
• Social Engineering
• Bugs
• Backdoors
Q NO 3) What is denial of service attack ? explain in detial
Q NO 4) Discuss the following in detail :
a) Botnets with architechture
b) Phissing attacks and its types
Unit-III
Q NO 1) What is Cryptography? What is the need for encryption for sending data over a
network?
Q NO 2) What is the difference between symmetric and asymmetric cryptography ?
Q NO 3) Deifine the following in detail :
• Symmetric cryptography
• Asymmetric cryptography
Q NO 4) Explain the following in detail :
a) DES
b) RSA
c) PGP
Q NO 5) What is hashing? Explain in details
Q NO 6) Define the following in detail :
• MD5 hash
• SSH
• SSL
• HTTPS
• Digital Signatures

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy