Question
(Mid Term, Marks = 5, Lesson No. )
What are the major categories of security services? Briefly give an overview of each type.
Answer:
Question
(Mid Term, Marks = 5, Lesson No. )
What is the difference between a private key and a secret key?
Answer:
Question
(Mid Term, Marks = 5, Lesson No. )
Give a brief overview of functionality of CBC-MAC. Also mention the services provided by CBC-MAC.
Answer:
Question
(Mid Term, Marks = 10, Lesson No. )
Explain the concept of public key infrastructure with the hekp of an example. Also give the components of PKI.
Answer:
Question
(Mid Term, Marks = 5, Lesson No. )
In context of hashing what is meant by compression.
Answer:
Question
(Mid Term, Marks = 5, Lesson No. )
What CMAM. How it work?
Answer:
Question
(Mid Term, Marks = 5, Lesson No. )
If you are supposed to implement one-time pad encryption scheme, which requirements do you think each pad fulfill so that it is unbreakable?
Answer:
Question
(Mid Term, Marks = 10, Lesson No. )
Define working and diagram of digital signature with ahmad and bill example in the slides.
Answer:
Question
(Final Term, Marks = , Lesson No. )
How can protect information while flash drive can easily be attached to computer now a days?
Answer:
Question
(Final Term, Marks = , Lesson No. )
Which mechanism is used In S/MIME to achieve authentication and non-repudiation?
Answer:
Question
(Final Term, Marks = , Lesson No. )
How AH,ESP and IPsec is different when calculating ICV?
Answer:
Question
(Final Term, Marks = , Lesson No. )
How firewall is different from IPS?
Answer:
Question
(Final Term, Marks = , Lesson No. )
How Bastion host is most secure system?
Answer:
Question
(Final Term, Marks = , Lesson No. )
Explain Evasion with example?
Answer:
Question
(Final Term, Marks = , Lesson No. )
Why End-to-End encryption is important?
Answer:
Question
(Final Term, Marks = , Lesson No. )
Write about the Patches criteria for OS.
Answer:
Question
(Final Term, Marks = , Lesson No. )
Write IPS false negative records.
Answer: