Computer security is an important field of study for most day-to-day transactions. It arises when we turn on our cellular phones, check our voice mail and e-mail, use debit or credit cards, order a pay-per view movie, use a transponder through EZ-Pass, sign on to online video games, and even during visits to the doctor. It is also often used to establish virtual private networks (VPNs) and Secure Shell connections (SSH), which allows employees to telecommute and access computers remotely.
Also Read: MCQ – Cryptography and Network Security
The use, and often misuse, of cryptography to solve security problems are driven by one cause: the need for security. Simply needing security does not make it so, a lesson all too often learned after the fact, or more importantly, after the exploits.
- Explain the goals of security.
- What are the significant features of network security?
- Define information security. Discuss the three aspects of security that are to be considered in the design of a secure information system.
- Define security attacks. Distinguish between passive and active attacks. Give examples.
- Explain the threat to integrity.
- Describe security services.
- Explain the categories of security mechanisms.
- Briefly explain the denial of service attack.
- What is the need for information security?
- Distinguish between direct attacks and indirect attacks.
- Differentiate between attack and threat.
- How does a threat to information security differ from an attack? Explain the groups of threats to information security.
- What are the principle procedures of a conventional encryption technique?
- Explain a standard data encryption algorithm in detail.
- What is cryptanalysis?
- What is plaintext? What is cipher text? Explain the procedure for the conversion of plaintext into ciphertext.
- What is the difference between a substitution cipher and a transposition cipher?
- What are the two basic ways of transforming plaintext into cipher text?
- Define cipher text.
- Discuss the difference between mono-alphabetic and poly-alphabetic ciphers.
- Explain the block cipher.
- Explain the classical encryption technique with a symmetrical cipher model.
- Define diffusion.
- Explain the Caesar cipher and mono-alphabetic cipher.
- Why has modular arithmetic been used in cryptography?
- How are poly-alphabetic ciphers implemented and how are they superior to mono-alphabetic ciphers?
- Describe the linear feedback shift register sequence and finite fields with their application in cryptography.
- A block cipher operates on blocks of fixed length, often 64 or 128 bits. How does output feedback (OFB) mode make a block cipher into a synchronous stream cipher?
- What are the different transposition techniques? Explain.
- Use the Caesar cipher with key =15 to encrypt the message “Hello”.
- What is differential cryptanalysis?
- What are transposition ciphers?
- How do you convert a block cipher into a stream cipher by using the cipher feedback (CFB) mode? Explain.
- Differentiate between block and stream ciphers.
- Explain operations of various transposition ciphers in detail.
- Explain in detail about Feistel encryption with a diagram.
- Discuss the different categories of product ciphers.
- Show and explain Feistel encryption and decryption algorithms.
- Briefly explain the design principles of block ciphers.
- Discuss in detail the block cipher mode of operation.
- Compare invertible and non-invertible ciphers.
- What are the various block cipher design principles? Explain how different cryptographic algorithms use the Feistel cipher structure.
- Discuss the design principles of the block cipher technique.
- What is a Feistel cipher? Name the ciphers that follow the Feistel structure.
- What are the confusion and diffusion properties of modern ciphers?
- Explain the working of DES in detail.
- Explain the design criteria for DES.
- Draw the general structure of DES and explain the encryption and decryption process.
- Explain the process of key generation in DES with an example.
- Discuss the advantages and disadvantages of the DES algorithm.
- How do different attacks crack the DES standard? Explain.
- What is TDES? Explain the working of TDES.
- Explain different cryptanalysis.
- Describe the detailed structure of IDEA.
- Explain the operation of IDEA.
- Explain the working model of a single round DES encryption algorithm with a neat sketch. Also compare DES and 3DES.
- With suitable sketches, explain the working of the DES algorithm.
- What is the role of S-boxes in DES?
- How is key expansion done in Blowfish?
- Describe IDEA encryption and decryption. Write the applications which use IDEA.
- Explain the Data Encryption Standard (DES) in detail and also explain the weaknesses of DES?
- Explain the round transformation of IDEA. Also explain the key scheduling of IDEA.
- How is the expansion permutation function done in DES?
- What are the important features of the advanced encryption standard (AES)? How is AES different from DES?
- List out the parameters of AES.
- Discuss the details of the encryption process using the AES algorithm.
- Explain in detail key generation in the AES algorithm and its expansion format.
- Explain the key expansion algorithm.
- Explain the decryption process using the AES algorithm.
- Which four tasks are performed in each round of AES cipher? Explain.
- Explain the key expansion process in AES.
- Write about the following in an AES cipher:
- Substitute Bytes Transformation
- ShiftRows Transformation
- MixColumns Transformation
- AddRoundKey Transformation
- Give the structure of AES. Explain how encryption/decryption is done in AES.
- What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie-Hellman?
- The values of the public key and private key are (N, E) = (33, 3) and (N, D) = (33, 7). Use the RSA algorithm to encrypt the word “Technology” and also show how the word can be decrypted form its encrypted form.
- Illustrate the ElGamal encryption and decryption algorithm.
- Write about key generation, encryption, and decryption in ElGamal cryptosystems.
- Let p = 353 and g = 3, a = 97, and b = 233. Use the Diffie-Hellman key exchange algorithm to find Ka , Bb and secret key K.
- Describe public and private keys in the ECC system and explain about security of ECC.
- Briefly explain the Diffie-Hellman key exchange algorithm.
- What are discrete logarithms? Explain how are they used in public key cryptography.
- What are the attacks that are possible on RSA?
- Explain the ElGamal cryptosystem with examples.
- Discuss the security of the ElGamal cryptosystem.
- Differentiate between symmetric and asymmetric encryption schemes
- What are the criteria of the cryptographic hash function?
- Explain the Chinese remainder theorem with an example. Message Integrity and Message Authentication.
- Explain the Chinese remainder theorem. Using CRT find “x” from the equations x ≡ 7 mod 13 and x ≡ 11 mod 12.
- What is the birthday attack on digital signatures?
- Describe the Chinese remainder theorem and explain its application.
- Give the structure of CMAC. What is the difference between CMAC and HMAC?
- Describe the process involved in digital signatures. Explain about different digital signatures.
- Write about the HMAC algorithm. What needs to be done to speed up the HMAC algorithm?
- What is the one-way property in a hash function?
- Explain about MD5 in detail.
- Illustrate about the SHA algorithm and explain.
- Define hash function.
- What are the functions of hash functions in cryptography?
- Explain SHA.
- What are the requirements for hash functions?
- What properties must be satisfied by a hash function?
- What is meant by a message digest? Give an example.
- Clearly discuss the Secure Hash Algorithm (SHA).
- Compare the distinct features of the SHA-1 and MD5 algorithm.
- Why do MD4, MD5, and SHA-1 require padding of messages that are already in multiples of 512 bits? What is the minimal and maximal amount of padding in each of these cases?
- Discuss the properties required for a hash function to produce a secure message digest. Consider a brute force attack on a digitally signed message of length n bits and determine the time complexities of the computational properties of the hash function.
- Compare the distinct features of the SHA-1 and MD5 algorithms.
- In cryptography MD5 is a widely used cryptographic hash function with a 128 bit hash value. Explain the MD5 algorithm and its workings in detail.
- What are the two basic attacks on a hash function? Explain them briefly.
- Give an interpretation of the term collision resistance.
- Illustrate the Secure Hash algorithm in brief.
- What is the difference between a hash function and a message authentication code?
- Give the structure of the SHA-512 compression function. Explain the structure of each round. Is the man in the middle attack possible on SHA-512?
- Explain the compression of the Secure Hash Algorithm.
- What are the requirements of hash functions?
- Describe the steps in finding the message digest using the SHA-512 algorithm. What is the order of finding two messages having the same message digest?
- What is the use of a digital signature? What are the requirements of a digital signature scheme?
- Write short notes on the Digital Signature Algorithm.
- What are the differences between a digital signature and a digital certificate?
- Explain the concept of a digital signature.
- What is a digital signature? Explain the characteristics of a digital signature.
- What is a digital envelope? Explain the signing process in a digital envelope.
- What is the Digital Signature Algorithm (DSA)? Explain the signature generation and signature verification process.
- Explain the process of the Elliptic Curve Digital Signature Algorithm (ECDSA).
- Explain the ElGamal signature scheme.
- Describe the RSA digital signature.
- What factors contribute to a biometric’s development?
- Using an example distinguish between positive and negative identification.
- Identify two reasons for biometric characteristic variation over time.
- Discuss the measures that reflect the effectiveness of a biometric authentication system.
- Explain about physiological biometric technologies.
- With suitable examples and diagrams, explain DNA, signature, and handwriting technologies.
- Describe the benefits of biometrics over traditional authentication systems.
- Write a note on DNA biometrics.
- Write notes on keyboard/keystroke dynamics.
- What is a salted password?
- What are zero-knowledge proof systems?
- Draw a simple sketch for shared key authentication.
- What is a dictionary attack?
- List any four problems with using password authentication.
- Discuss handprint biometrics.
- List out the requirements of Kerberos.
- Does PKI use symmetric or asymmetric encryption? Explain your answer.
- How are public key certificates generated in the X.509 authentication service? What are the forward and reverse certificate in X.509?
- Illustrate the configuration of Kerberos.
- Client machine C wants to communicate with server S. Explain how can it be achieved through the Kerberos procedure.
- Write a note on replicated KDCs.
- Describe Kerberos as a key distribution center and an authentication protocol.
- Explain the Kerberos protocol and give a sketch of the simplified overview of the actions taken by the TGS.
- What is a Ticket Granting Server?
- Describe the comparison between the OSI and TCP/IP layer architecture model.
- Explain the DNS resolution process.
- Explain DNS cache poisoning and spoofing.
- Explain the attacks using ICMP messages.
- Describe the applications of ping.
- List the different types of attacks on networks.
- Write a note on network vulnerability.
- What is meant by a man-in-the-middle attack?
- What do you mean by a Trojan horse?
- Discuss a three-way security threat.
- How does DoS differ from DDoS? Which is potentially more dangerous and devastating? Why?
- What is social engineering?
- What are packet sniffers? Name two of the well-known packet sniffers.
- Explain the important aspects of packet sniffers and their use.
- What is IP Spoofing? Explain the different types of IP spoofing.
- Explain session hijacking.
- Explain a buffer overflow attack.
- Discuss synchronous flooding.
- What is a network security model (NSM)? Explain the functions of different layers of the NSM.
- What is access control? Briefly enumerate the types of access controls.
- Explain e-mail protocols.
- Describe e-mail security services.
- What are the three scenarios to be considered for the implementation of e-mail security services? Explain.
- What is a fingerprint in a PGP system? How can you import a public key of a person into your key ring?
- Write a note about Privacy Enhanced Mail (PEM).
- Explain Pretty Good Privacy in detail.
- List out the services provided by PGP.
- How is authentication achieved in Pretty Good Privacy?
- Explain PGP message generation and reception.
- Explain clearly with relevant illustration how authentication is addressed in PGP.
- s-MIME allows messages to be signed and encrypted. Should information be signed or encrypted first? What would be the difference?
- Compare and contrast s-MIME and PGP protocols.
- Distinguish between signed data and clear-signed data in the context of S-MIME.
- In a Secured Socket Layer (SSL) connection, is the session key chosen by the client or the server?
- Justify the inclusion of an SSL layer in between the application layer and transport layer.
- Explain the handshake protocol actions of SSL.
- In a Secured Socket Layer (SSL), is the session key for the connection chosen by the client or the server? How is it communicated to the other party?
- How does SSL use TCP to provide end-to-end secure service? What is the record protocol operation in SSL?
- Describe SSL Architecture in detail.
- Mention four SSL Protocols.
- What is IPSec and what are the two modes of IPSec operation? What types of security services are provided by IPSec?
- How will you justify the need of IP security along with other security measures?
- Discuss five benefits of IPSec as a security protocol.
- Explain the architecture of IPSEC.
- Discuss the various components of IPSec architecture. What is an antireply mechanism in context of IPSec?
- How are transport and tunnel nodes used in IPsec Encapsulating Security Payload (ESP) service?
- Give the IPSec ESP format.
- AH in IPsec is responsible to prevent replay attacks?
- What parameters identify a Security Association (SA) and what parameters characterize the nature of a particular SA?
- Briefly explain the ESP protocol along with its different modes of operation.
- What is the security purpose for the fields, such as sequence number, of an IPSec packet?
- Briefly explain Security Associations in IPSec.
- What is meant by ARP poisoning?
- List the types of attacks in the data link layer.
- Explain a MAC flooding attack.
- What is port stealing? Explain a port stealing attack on a switch.
- What is a DHCP attack? Explain different types of DHCP attacks.
- What is a CAM overflow attack? Explain a CAM table.
- Describe VLAN Hopping. Explain protection against VLAN Hopping.
- What is the spanning tree protocol (STP)? Explain.
- Explain the four phases of a virus.
- Differentiate between adware and a virus.
- Explain the boot sector virus.
- Describe the worm attack procedure.
- Explain different types of worms.
- What are the detection methods used by IDS?
- Explain the different types of IDS.
- Explain in detail about network-based IDS and host-based IDS.
- Describe the IDS and their approaches in protecting networks and host information assets.
- What is the purpose of signature based IDS?
- Mention the limitations of IDS.
- Discuss the different types of intrusion detection and prevention systems with suitable examples.
- Why is IDS needed?
- Mention the limitations of IDS.
- Explain the different types of intrusion detection systems.
- Explain statistical anomaly detection and rule based intrusion detection.
- What are honeypots? Explain the functions of honeypots.
- Define padded cells in honeypots.
- Explain the classification of honeypots.
- Give the advantages and disadvantages of honeypots.
- Write a short note on packet sniffers, honeypots, and honeynets.
- What are the measures that may be used for intrusion detection?
- How does a signature-based IDPS differ from a behavior-based IDPS?
- Describe IDS and their approaches in protecting network and host information assets.
- Write short notes on:
- Honeypots, honeynets
- Padded cell systems
- Trap and Trace systems
- Active intrusion prevention
- Write briefly about the signature-based Intrusion Detection Systems.
- Explain about host-based Intrusion Detection Systems in brief.
- What is an audit record? What is the use of an audit record in intrusion detection?
- What is IDS? Explain profile-based IDS.
- How is the behavior of an intruder found?
- How does a screened host architecture for a firewall differ from a screened subnet firewall architecture? Which offers more security for the information assets that remain on the trusted network? Explain with a neat sketch.
- What are the approaches of implementing a firewall?
- How can a firewall be categorized based on its processing mode?
- With neat diagrams highlight the differences between a screened host Firewall single homed bastion and a screened host firewall dual homed bastion.
- Discuss the different types of firewall systems.
- Describe how various types of firewalls interact with the network traffic at various levels of the OSI model.
- Describe firewall technology and the various approaches to firewall implementation.
- List the five generations of firewall technology. Which generation is still in common use?
- Describe how the various types of firewalls interact with the network traffic at various levels of the OSI model.
- Define firewall. What are its different types? Explain the working of each in detail.
- 260 One-Liner Information Security Questions and Answers for Fast Learning
- Top 20 HTML5 Interview Questions with Answers
- 80 Most Important Network Fundamentals Questions With Answers
- 100 Most Important SOC Analyst Interview Questions
- Top 40 Cyber Security Questions and Answers
- Top 10 React JS Interview Theory Questions and Answers
- CISSP – Practice Test Questions – 2024 – Set 20 (53 Questions)
- Part 2: Exploring Deeper into CCNA – Wireless (145 Practice Test Questions)
- Part 1: Mastering CCNA – Wireless (145 Practice Test Questions)
- [1z0-1085-20] Oracle Cloud Infrastructure Foundations 2020 Associate MCQ Questions – Part 3