CS3691 Revised QB 13.9.24
CS3691 Revised QB 13.9.24
Question Bank
Course Outcomes:
CO1: Explain the Network Models, layers and functions.
CO2: Categorize and classify the routing protocols.
CO3: List the functions of the transport and application layer.
CO4: Evaluate and choose the network security mechanisms.
CO5: Discuss the hardware security attacks and countermeasures
Part A
Q.N Questions Mark CO RBT Competence PI
o s No. Leve
l
1. List the types of Networks. 2 CO1 K1 Remembering 1.4.
1
2. List the parameters used to measure a network 2 CO1 K1 Remembering 1.4.
performance. 1
3. List the services provided by data link layer 2 CO1 K1 Remembering 1.4.
1
4. What are the two sub layers of data link layer? 2 CO1 K1 Remembering 1.4.
1
5. What is meant by framing? 2 CO1 K1 Remembering 1.4.
1
6. Define hamming distance. 2 CO1 K1 Remembering 1.4.
1
7. Define Bandwidth and Latency. 2 CO1 K1 Remembering 1.4.
1
8. Interpret about DHCP 2 CO1 K2 Understandin 1.4.
g 1
9. List the key ingredients of technology that determines 2 CO1 K1 Remembering 1.4.
nature of a LAN. List the common topologies 1
available for LAN.
10. How do layers of the internet model correlate to the 2 CO1 K2 Understandin 1.4.
layers of the OSI model? g 1
11. Compare OSI and TCP 2 CO1 K2 Understandin 1.4.
g 1
12. What is a protocol? What are the key elements of a 2 CO1 K1 Remembering 1.4.
protocol? 1
13. Define simplex, Half duplex and full duplex. 2 CO1 K1 Remembering 1.4.
1
14. Define Repeater and Hub. 2 CO1 K1 Remembering 1.4.
1
15. Find the hamming distance between two pair of code 2 CO1 K2 Understandin 1.4.
words. A = 01011 B = 11110 g 1
PART B
1. Explain the layers of the ISO/OSI protocol stack? 13 CO1 K2 Understandin 1.4.
Briefly list out their functions. g 1
2. Explain the different layers and its function of TCP/IP 13 CO1 K2 Understandin 1.4.
model. g 1
3. Explain various flow control mechanisms. i) Stop Wait 13 CO1 K2 Understandin 1.4.
protocol ii) Sliding window protocol g 1
4. Discuss in detail about the Byte- oriented Protocols 13 CO1 K3 Applying 1.4.
(PPP), Bit-oriented Protocols (HDLC) and wireless 1
LAN
5. Summarize in detail about the Ethernet ,Bluetooth and 13 CO1 K3 Applying 1.4.
Wired LAN protocol or IEEE 802.3 with frame format 1
protocol
6. Explain in detail about the error detection and error 13 CO1 K2 Understandin 1.4.
correction methods used in data link layer g 1
PART C
1. The message 11001001 is to be transmitted, using 15 CO1 K3 Applying 1.4.
CRC error detection algorithm. Assuming the CRC 1
polynomial to be x3+1, determine the message that
should be transmitted. If the second left most bit is
corrupted, show that it is detected by the receiver
2. Obtain the 4-bit CRC code for the data bit sequence 15 CO1 K3 Applying 1.4.
10011011100 using the polynomial x4+x2+1 1
/Polynomial M(X) = x5+x4+1 generating prime
polynomial G(X) = x3+x2+1. Generate a 3 bit code,
C(X) is to be appended to M(X)
Unit II –
Part A
1. List the main functions performed by the Network 2 CO2 K1 1.4.
layer 1
2. Give the comparison of unicast, multicast and 2 CO2 K2 Remembering 1.4.
broadcast routing. 1
3. Identify the class of the following IP address 2 CO2 K2 Remembering 1.4.
(a) 110.34.56.45 1
(b) 212.208.63.2
4. Explain ICMP and write the function. 2 CO2 K2 Remembering 1.4.
1
5. What is RIP? 2 CO2 K1 Understandin 1.4.
g 1
6. Why IPV6 is preferred than IPV4? 2 CO2 K2 Remembering 1.4.
1
7. What is subnet mask? 2 CO2 K1 Understandin 1.4.
g 1
8. What is the use of Network Address Translation? 2 CO2 K1 Understandin 1.4.
g 1
9. What is the network address in a class A subnet with 2 CO2 K1 Understandin 1.4.
the IP addresses of one of the hosts as 25.34.12.56 and g 1
mask 255.255.0.0?
10. Define CIDR? 2 CO2 K1 Understandin 1.4.
g 1
11. Define Routing 2 CO2 K1 Understandin 1.4.
g 1
12. List the three major protocols for unicast routing 2 CO2 K1 Understandin 1.4.
g 1
13. Compare Interdomain and Intra domain routing 2 CO2 K1 Understandin 1.4.
g 1
14. Define BGP. 2 CO2 K1 Understandin 1.4.
g 1
15. Explain about ARP and RARP 2 CO2 K2 Remembering 1.4.
1
PART B
1. Illustrate IPv4 Classful addressing and packet format 13 CO2 K3 Applying 1.4.
in detail. 1
2. Illustrate IPv6 Classful addressing and packet format 13 CO2 K3 Applying 1.4.
in detail. 1
3. Apply the Distance Vector Routing Algorithm for the 13 CO2 K3 Applying 1.4.
graph given below 1
4. Develop the Link state routing with Dijikstra's 13 CO2 K3 Applying 1.4.
algorithm for the following graph. 1
Unit III–
Part A
1. Define congestion 2 CO3 K1 Remembering 1.4.
1
2. What is the main difference between TCP and 2 CO3 K1 Remembering 1.4.
UDP? /Differentiate between connection and 1
connectionless oriented protocol.
3. What is the difference between service point address, 2 CO3 K1 Remembering
logical address and physical address?
4. What are the four aspects related to the reliable 2 CO3 K1 Remembering 1.4.
delivery of data? 1
5. List the advantages of Connection oriented services 2 CO3 K1 Remembering 1.4.
over connectionless services. 1
6. What examples can you infer in Quality-of-Service 2 CO3 K1 Remembering 1.4.
approaches? ( 1
7. Why do we need a Domain Name System when we 2 CO3 K2 Understandin 1.4.
can directly use an IP address? g 1
8. How would you express URL? 2 CO3 K2 Understandin 1.4.
g 1
9. Define Jitter. 2 CO3 K1 Remembering 1.4.
1
10. What are the three broad categories of audio and video 2 CO3 K1 Remembering 1.4.
services? 1
11. Compare the HTTP and FTP. 2 CO3 K2 Understandin 1.4.
g 1
12. Name four factors needed for a secure network? 2 CO3 K1 Remembering 1.4.
1
13. List the two types of DNS message. ( 2 CO3 K1 Remembering 1.4.
1
14. Discuss process - process communication 2 CO3 K2 Understandin 1.4.
g 1
15. Which protocol support email and give details about 1 CO3 K1 Remembering 1.4.
that protocol? What are the basic functions of e-mail? 1
PART B
1. Define UDP. Discuss the operations of UDP. Explain 13 CO3 K2 Understandin 1.4.
UDP checksum with one example g 1
2. Explain in detail about 3 way handshaking process in 13 CO3 K2 Understandin 1.4.
TCP connection with required diagrammatic g 1
representation
3. Illustrate with example. i. Stop -and-wait protocol ii. 13 CO3 K3 Applying 1.4.
Go-Back-N Protocol iii. Selective -Repeat protocol. 1
4. What are the 2 broad categories of Congestion control 13 CO3 K2 Understandin 1.4.
mechanisms? Briefly explain all techniques g 1
5. Discuss how the Simple Mail Transfer Protocol 13 CO3 K2 Understandin 1.4.
(SMTP) is useful in electronic mail. or Architecture of g 1
mailing system
6. Explain about HTTP. Give their uses, state strengths 13 CO3 K2 Understandin 1.4.
and weaknesses g 1
PART C
7. i) Explain the process of web page loading of the 15 CO3 K3 Applying 1.4.
given page: 1
http://www.annauniv.edu/ug/cse/index.html. Assume
the IP address is unknown, HTTP 1.1 is used, web
page is available. ii) How a stateful session on a
shopping cart application at flipkart.com can be
implemented by a stateless HTTP? What will be the
security vulnerability in this approach?
8. Explain in detail about DNS messages. 15 CO3 K2 Understandin 1.4.
g 1
Unit IV–
Part A
1. List the objectives of computer security 2 CO4 K1 Remembering
2. Explain OSI security model. 2 CO4 K2 Understandin 1.4.
g 1
3. Compare threat and attack. 2 CO4 K2 Understandin 1.4.
g 1
4. Write some of the security services. 2 CO4 K1 Remembering 1.4.
1
5. Compare active and passive attacks. 2 CO4 K2 Understandin 1.4.
g 1
6. List the types of active attacks. 2 CO4 K1 Remembering 1.4.
1
7. List the types of passive attacks. 2 CO4 K1 Remembering 1.4.
1
8. Interpret about Encipherment. 2 CO4 K2 Understandin 1.4.
g 2
9. Define Nonrepudiation 2 CO4 K1 Remembering 1.4.
2
10. Explain the features of AES algorithm. 2 CO4 K2 Understandin 1.4.
g 1
11. Explain SHA and mention its applications. 2 CO4 K2 Understandin 1.4.
g 2
12. Explain RSA algorithm. 2 CO4 K2 Understandin 1.4.
g 1
13. List the steps to be followed in key management. 2 CO4 K1 Remembering 1.4.
1
14. Interpret the applications of public key cryptosystem. 2 CO4 K2 Understandin 1.4.
g 2
PART B
1. 13 CO4 K2 Understandin 1.4.
Explain various security attacks.
g 1
2. 13 CO4 K2 Understandin 1.4.
Explain Digital signature Algorithm (DSA).
g 1
3. Examine Advanced Encryption Standard (AES) 13 CO4 K4 Analyzing 1.4.
with detailed process 1
4. Analyse the Secure Hash function step by step 13 CO4 K4 Analyzing 1.4.
with example. 1
5. 13 CO4 K4 Analyzing 1.4.
Analyse the OSI security architecture.
2
PART C
1 Assume p=17 and q=11, to examine the 15 CO4 K4 Analyzing 1.4.
encryption and decryption process using RSA 1
algorithm and conclude the results
Unit V–
Part A
1. 2 CO5 K1 Remembering 1.4.
1
2. 2 CO5 K2 Understandin 1.4.
g 1
3. 2 CO5 K1 Remembering 1.4.
1
4. 2 CO5 K1 Remembering 1.4.
1
5. 2 CO5 K2 Understandin 1.4.
g 1
6. 2 CO5 K1 Remembering 1.4.
1
7. 2 CO5 K1 Remembering 1.4.
1
8. 2 CO5 K1 Remembering 1.4.
1
9. 2 CO5 K1 Remembering 1.4.
1
10. 2 CO5 K1 Remembering 1.4.
1
11. 2 CO5 K1 Remembering 1.4.
1
12. 2 CO5 K1 Remembering 1.4.
1
13. 2 CO5 K1 Remembering 1.4.
1
14. 2 CO5 K1 Remembering 1.4.
1
PART B
1. Explain Hardware attack and countermeasures 13 CO5 K2 Understandin 1.4.
in detail. (13) g 1
2. 13 CO5 K2 Understandin 1.4.
Summarize about EM side channel attacks. (13)
g 1
3. Explain in detail about the block chain 13 CO5 K2 Understandin 1.4.
technology (13) g 1
4. Make use of Hardware Trojan taxonomy and 13 CO5 K3 Applying 1.4.
explain about Hardware attacks 1
5. 13 CO5 K3 Applying 1.4.
Develop the taxonomy of side channel attacks
1
PART C
1. Apply power analysis concepts to interpret the 15 CO5 K3 Applying 1.4.
hardware attack 1
2. Develop fault injection attack with neat 15 CO5 K3 Applying 1.4.
diagrams 1
Prepared By Verified By
Dr.Susee S.K.