0% found this document useful (0 votes)
12 views7 pages

CS3691 Revised QB 13.9.24

The document is a question bank for the subject 'Networks and Security' for the Electronics and Communication Engineering department at Mohamed Sathak A J College of Engineering. It outlines course outcomes, covers various units related to network models, routing protocols, transport and application layers, and network security mechanisms. The question bank includes multiple-choice questions, detailed explanations, and practical applications across different parts of the syllabus.

Uploaded by

suseekannan07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

CS3691 Revised QB 13.9.24

The document is a question bank for the subject 'Networks and Security' for the Electronics and Communication Engineering department at Mohamed Sathak A J College of Engineering. It outlines course outcomes, covers various units related to network models, routing protocols, transport and application layers, and network security mechanisms. The question bank includes multiple-choice questions, detailed explanations, and practical applications across different parts of the syllabus.

Uploaded by

suseekannan07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Mohamed Sathak A J College of Engineering, Chennai – 603103

Department of Electronics and Communication Engineering

Question Bank

Subject Code & Subject Name : EC3401-Networks and Security


Year & Sem : II & IV

Course Outcomes:
CO1: Explain the Network Models, layers and functions.
CO2: Categorize and classify the routing protocols.
CO3: List the functions of the transport and application layer.
CO4: Evaluate and choose the network security mechanisms.
CO5: Discuss the hardware security attacks and countermeasures

Unit I – NETWORK MODELS AND DATALINK LAYER


Overview of Networks and its Attributes – Network Models – OSI, TCP/IP, Addressing –
Introduction to Datalink Layer – Error Detection and Correction – Ethernet (802.3)- Wireless LAN
– IEEE 802.11, Bluetooth – Flow and Error Control Protocols – HDLC – PPP.

Part A
Q.N Questions Mark CO RBT Competence PI
o s No. Leve
l
1. List the types of Networks. 2 CO1 K1 Remembering 1.4.
1
2. List the parameters used to measure a network 2 CO1 K1 Remembering 1.4.
performance. 1
3. List the services provided by data link layer 2 CO1 K1 Remembering 1.4.
1
4. What are the two sub layers of data link layer? 2 CO1 K1 Remembering 1.4.
1
5. What is meant by framing? 2 CO1 K1 Remembering 1.4.
1
6. Define hamming distance. 2 CO1 K1 Remembering 1.4.
1
7. Define Bandwidth and Latency. 2 CO1 K1 Remembering 1.4.
1
8. Interpret about DHCP 2 CO1 K2 Understandin 1.4.
g 1
9. List the key ingredients of technology that determines 2 CO1 K1 Remembering 1.4.
nature of a LAN. List the common topologies 1
available for LAN.
10. How do layers of the internet model correlate to the 2 CO1 K2 Understandin 1.4.
layers of the OSI model? g 1
11. Compare OSI and TCP 2 CO1 K2 Understandin 1.4.
g 1
12. What is a protocol? What are the key elements of a 2 CO1 K1 Remembering 1.4.
protocol? 1
13. Define simplex, Half duplex and full duplex. 2 CO1 K1 Remembering 1.4.
1
14. Define Repeater and Hub. 2 CO1 K1 Remembering 1.4.
1
15. Find the hamming distance between two pair of code 2 CO1 K2 Understandin 1.4.
words. A = 01011 B = 11110 g 1

PART B
1. Explain the layers of the ISO/OSI protocol stack? 13 CO1 K2 Understandin 1.4.
Briefly list out their functions. g 1
2. Explain the different layers and its function of TCP/IP 13 CO1 K2 Understandin 1.4.
model. g 1
3. Explain various flow control mechanisms. i) Stop Wait 13 CO1 K2 Understandin 1.4.
protocol ii) Sliding window protocol g 1
4. Discuss in detail about the Byte- oriented Protocols 13 CO1 K3 Applying 1.4.
(PPP), Bit-oriented Protocols (HDLC) and wireless 1
LAN
5. Summarize in detail about the Ethernet ,Bluetooth and 13 CO1 K3 Applying 1.4.
Wired LAN protocol or IEEE 802.3 with frame format 1
protocol

6. Explain in detail about the error detection and error 13 CO1 K2 Understandin 1.4.
correction methods used in data link layer g 1
PART C
1. The message 11001001 is to be transmitted, using 15 CO1 K3 Applying 1.4.
CRC error detection algorithm. Assuming the CRC 1
polynomial to be x3+1, determine the message that
should be transmitted. If the second left most bit is
corrupted, show that it is detected by the receiver
2. Obtain the 4-bit CRC code for the data bit sequence 15 CO1 K3 Applying 1.4.
10011011100 using the polynomial x4+x2+1 1
/Polynomial M(X) = x5+x4+1 generating prime
polynomial G(X) = x3+x2+1. Generate a 3 bit code,
C(X) is to be appended to M(X)
Unit II –

Part A
1. List the main functions performed by the Network 2 CO2 K1 1.4.
layer 1
2. Give the comparison of unicast, multicast and 2 CO2 K2 Remembering 1.4.
broadcast routing. 1
3. Identify the class of the following IP address 2 CO2 K2 Remembering 1.4.
(a) 110.34.56.45 1
(b) 212.208.63.2
4. Explain ICMP and write the function. 2 CO2 K2 Remembering 1.4.
1
5. What is RIP? 2 CO2 K1 Understandin 1.4.
g 1
6. Why IPV6 is preferred than IPV4? 2 CO2 K2 Remembering 1.4.
1
7. What is subnet mask? 2 CO2 K1 Understandin 1.4.
g 1
8. What is the use of Network Address Translation? 2 CO2 K1 Understandin 1.4.
g 1
9. What is the network address in a class A subnet with 2 CO2 K1 Understandin 1.4.
the IP addresses of one of the hosts as 25.34.12.56 and g 1
mask 255.255.0.0?
10. Define CIDR? 2 CO2 K1 Understandin 1.4.
g 1
11. Define Routing 2 CO2 K1 Understandin 1.4.
g 1
12. List the three major protocols for unicast routing 2 CO2 K1 Understandin 1.4.
g 1
13. Compare Interdomain and Intra domain routing 2 CO2 K1 Understandin 1.4.
g 1
14. Define BGP. 2 CO2 K1 Understandin 1.4.
g 1
15. Explain about ARP and RARP 2 CO2 K2 Remembering 1.4.
1
PART B
1. Illustrate IPv4 Classful addressing and packet format 13 CO2 K3 Applying 1.4.
in detail. 1

2. Illustrate IPv6 Classful addressing and packet format 13 CO2 K3 Applying 1.4.
in detail. 1

3. Apply the Distance Vector Routing Algorithm for the 13 CO2 K3 Applying 1.4.
graph given below 1

4. Develop the Link state routing with Dijikstra's 13 CO2 K3 Applying 1.4.
algorithm for the following graph. 1

5. Illustrate in detail about Internet control message 13 CO2 K3 Applying 1.4.


protocol version 4 with its message types. 1
6. Give the complete details about i) ICMP ii) ARP ) iii) 13 CO2 K3 Applying 1.4.
RARP. 1
PART C
1 An ISP is granted a block of addresses starting with 15 CO2 K2 Understandin 1.4.
150.80.0.0/16. The ISP wants to distribute these g 1
blocks to 2600 customers as follows.
a. The first group has 200 medium-size
businesses; each needs 128 addresses.
b. The second group has 400 small businesses;
each needs 16 addresses.
c. The third group has 2000 households; each
needs 4 addresses.
Design the sub-blocks and give the slash notation for
each sub-block. Find out how many addresses are still
available after these allocations.
An organization is granted the block 127.64.1.0/16. 15 CO2 K4 Analyzing 1.4.
The administrator wants to create 1024 subnets. 1
Find the subnet mask
Find the
number of
addresses in
each subnet
Find the first
and last
address
es in
subnet 1
Find the first and last addresses in subnet 1024

Unit III–

Part A
1. Define congestion 2 CO3 K1 Remembering 1.4.
1
2. What is the main difference between TCP and 2 CO3 K1 Remembering 1.4.
UDP? /Differentiate between connection and 1
connectionless oriented protocol.
3. What is the difference between service point address, 2 CO3 K1 Remembering
logical address and physical address?
4. What are the four aspects related to the reliable 2 CO3 K1 Remembering 1.4.
delivery of data? 1
5. List the advantages of Connection oriented services 2 CO3 K1 Remembering 1.4.
over connectionless services. 1
6. What examples can you infer in Quality-of-Service 2 CO3 K1 Remembering 1.4.
approaches? ( 1
7. Why do we need a Domain Name System when we 2 CO3 K2 Understandin 1.4.
can directly use an IP address? g 1
8. How would you express URL? 2 CO3 K2 Understandin 1.4.
g 1
9. Define Jitter. 2 CO3 K1 Remembering 1.4.
1
10. What are the three broad categories of audio and video 2 CO3 K1 Remembering 1.4.
services? 1
11. Compare the HTTP and FTP. 2 CO3 K2 Understandin 1.4.
g 1
12. Name four factors needed for a secure network? 2 CO3 K1 Remembering 1.4.
1
13. List the two types of DNS message. ( 2 CO3 K1 Remembering 1.4.
1
14. Discuss process - process communication 2 CO3 K2 Understandin 1.4.
g 1
15. Which protocol support email and give details about 1 CO3 K1 Remembering 1.4.
that protocol? What are the basic functions of e-mail? 1
PART B
1. Define UDP. Discuss the operations of UDP. Explain 13 CO3 K2 Understandin 1.4.
UDP checksum with one example g 1
2. Explain in detail about 3 way handshaking process in 13 CO3 K2 Understandin 1.4.
TCP connection with required diagrammatic g 1
representation
3. Illustrate with example. i. Stop -and-wait protocol ii. 13 CO3 K3 Applying 1.4.
Go-Back-N Protocol iii. Selective -Repeat protocol. 1
4. What are the 2 broad categories of Congestion control 13 CO3 K2 Understandin 1.4.
mechanisms? Briefly explain all techniques g 1
5. Discuss how the Simple Mail Transfer Protocol 13 CO3 K2 Understandin 1.4.
(SMTP) is useful in electronic mail. or Architecture of g 1
mailing system
6. Explain about HTTP. Give their uses, state strengths 13 CO3 K2 Understandin 1.4.
and weaknesses g 1
PART C
7. i) Explain the process of web page loading of the 15 CO3 K3 Applying 1.4.
given page: 1
http://www.annauniv.edu/ug/cse/index.html. Assume
the IP address is unknown, HTTP 1.1 is used, web
page is available. ii) How a stateful session on a
shopping cart application at flipkart.com can be
implemented by a stateless HTTP? What will be the
security vulnerability in this approach?
8. Explain in detail about DNS messages. 15 CO3 K2 Understandin 1.4.
g 1
Unit IV–

Part A
1. List the objectives of computer security 2 CO4 K1 Remembering
2. Explain OSI security model. 2 CO4 K2 Understandin 1.4.
g 1
3. Compare threat and attack. 2 CO4 K2 Understandin 1.4.
g 1
4. Write some of the security services. 2 CO4 K1 Remembering 1.4.
1
5. Compare active and passive attacks. 2 CO4 K2 Understandin 1.4.
g 1
6. List the types of active attacks. 2 CO4 K1 Remembering 1.4.
1
7. List the types of passive attacks. 2 CO4 K1 Remembering 1.4.
1
8. Interpret about Encipherment. 2 CO4 K2 Understandin 1.4.
g 2
9. Define Nonrepudiation 2 CO4 K1 Remembering 1.4.
2
10. Explain the features of AES algorithm. 2 CO4 K2 Understandin 1.4.
g 1
11. Explain SHA and mention its applications. 2 CO4 K2 Understandin 1.4.
g 2
12. Explain RSA algorithm. 2 CO4 K2 Understandin 1.4.
g 1
13. List the steps to be followed in key management. 2 CO4 K1 Remembering 1.4.
1
14. Interpret the applications of public key cryptosystem. 2 CO4 K2 Understandin 1.4.
g 2
PART B
1. 13 CO4 K2 Understandin 1.4.
Explain various security attacks.
g 1
2. 13 CO4 K2 Understandin 1.4.
Explain Digital signature Algorithm (DSA).
g 1
3. Examine Advanced Encryption Standard (AES) 13 CO4 K4 Analyzing 1.4.
with detailed process 1
4. Analyse the Secure Hash function step by step 13 CO4 K4 Analyzing 1.4.
with example. 1
5. 13 CO4 K4 Analyzing 1.4.
Analyse the OSI security architecture.
2
PART C
1 Assume p=17 and q=11, to examine the 15 CO4 K4 Analyzing 1.4.
encryption and decryption process using RSA 1
algorithm and conclude the results
Unit V–

Part A
1. 2 CO5 K1 Remembering 1.4.
1
2. 2 CO5 K2 Understandin 1.4.
g 1
3. 2 CO5 K1 Remembering 1.4.
1
4. 2 CO5 K1 Remembering 1.4.
1
5. 2 CO5 K2 Understandin 1.4.
g 1
6. 2 CO5 K1 Remembering 1.4.
1
7. 2 CO5 K1 Remembering 1.4.
1
8. 2 CO5 K1 Remembering 1.4.
1
9. 2 CO5 K1 Remembering 1.4.
1
10. 2 CO5 K1 Remembering 1.4.
1
11. 2 CO5 K1 Remembering 1.4.
1
12. 2 CO5 K1 Remembering 1.4.
1
13. 2 CO5 K1 Remembering 1.4.
1
14. 2 CO5 K1 Remembering 1.4.
1
PART B
1. Explain Hardware attack and countermeasures 13 CO5 K2 Understandin 1.4.
in detail. (13) g 1
2. 13 CO5 K2 Understandin 1.4.
Summarize about EM side channel attacks. (13)
g 1
3. Explain in detail about the block chain 13 CO5 K2 Understandin 1.4.
technology (13) g 1
4. Make use of Hardware Trojan taxonomy and 13 CO5 K3 Applying 1.4.
explain about Hardware attacks 1
5. 13 CO5 K3 Applying 1.4.
Develop the taxonomy of side channel attacks
1
PART C
1. Apply power analysis concepts to interpret the 15 CO5 K3 Applying 1.4.
hardware attack 1
2. Develop fault injection attack with neat 15 CO5 K3 Applying 1.4.
diagrams 1

Prepared By Verified By

Dr.Susee S.K.

(Name & Sign) (Name & Sign)


Format No : TLP 50 Rev.No : 2.0 Date : 20.02.25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy