Computer Network and Security Oral Questions
Assignment :1
1. What is RIP
2. What is working principle of RIP
3. What are the commands for configuring RIP protocol for Router?
4. What is access control list and what are types of access control list?
5. Explain commands for setting up standard and extended access control list
6. What is NAT ? Types of NATs
7. Difference between NAT and PAT
8. Explain the command for Setting up Static and dynamic NAT and PAT
9. Explain Inside local address ,Inside Global, Outside Local And Outside local Address in NAT
translation
10. Difference between router switch and Hub
Assignment: 2
1. What is EIGRP protocol? its usage, advantages and disadvantages.
2. EIGRP protocol working principal and Neighborhood relationship and route matric calculation
3. Commands for router setup , route and neighbor calculation.
4. What is OSPF protocol? its usage, advantages and disadvantages.
5. OSPF protocol working principal and Neighborhood relationship and route matric calculation
6. Commands for router setup , route and neighbor calculation.
7. What is the use of area in setting up the OSPF protocol
8. Steps for setting up the Static WLAN network , WLAN network with DHCP and MAC security
filter application
9. Which adapter is used for setting up WLAN network
Assignment:3
1. What is socket?
2. Socket method modules(socket family, socket types)
3. Socket methods server side client side for TCP and UDP socket
4. Difference between TCP and UDP socket
5. How you will Identify type of socket code
6. What is socket address
Assignment:4
1. What is ftp protocol? What is FTP server?
2. Steps to install FTP server in Cisco packet tracer.
3. What is web server
4. Steps to install web server in cisco packet tracer
Assignment : 5
1. What is client server paradigm?
2. What is Cryptography?
3. What is RSA Algorithm? Explain its working it?
4. What are asymmetric and symmetric cryptography
5. What is public and private keys and its components in RSA
6. What is formula to calculate cipher text and plain text in RSA.
7. Formula to calculate d, n , e, phi(n)
8. Solve theoretical example and prove it practically.
Assignment:6
1. What is RSA digital signature scheme and its is use?
2. How digital signature is authenticated between sender and receiver
3. Formula to calculate digital signature
4. Python libraries used in the program
Assignment:7
1. What is DES algorithm
2. What is block size and key size in DES
3. Process for calculating cipher text from plain text in DES?
4. What is deffie Hellman key exchange method?
5. Explain the steps in key exchange process
6. Formula to calculate key
7. Theoretical proof.
Assignment: 8
1. What is IDS (Intrusion Detection System)
2. What are the steps to install snort
3. Explain snort rules syntax and configuration methods
Assignment:9
9. What is cipher text
10. Explain Hill cipher, Ceaser cipher and substitution cipher
11. What is stream cither and block cipher difference
12. Example of symmetric cryptography algo. and Asymmetric cryptography algorithm.