qb
qb
Institute of Technology
An Autonomous Institution under VTU
DEPARTMENT: Information Science & Engineering
Semester: VI
Course Name: Cryptography and Information Security (21ISE161)
Semester: VI
Course Name: Cryptography and Information Security (21ISE161)
1. Explain the various threats that must be examined to assess its potential to endanger the
organization.
2. Briefly explain the risk assessment process.
3. What is access control, and what are the commonly used mechanisms for implementing
it?
4. Chalk out the process of deciding how to proceed with one of the five strategies.
5. How is an application layer firewall different from a packet-filtering firewall? Why is
an application layer firewall sometimes called a proxy server?
6. How is static filtering different from dynamic filtering of packets? Which is perceived
to offer improved security?
7. What is stateful inspection? How is state information maintained during a network
connection or transaction?
8. What is a circuit gateway, and how does it differ from the other forms of firewalls?
9. What special function does a cache server perform?
10. Explain the four common architectural implementations
11. Discuss the best practices for Firewalls
12. List the five generations of firewall technology. Which generations are still in common
use?
13. You are asked to develop an online university examination application, Identify the
various risk components.
14. With an example explain the various rule sets applied in firewalls.
15. What is a content filter? Where is it placed in the network to gain the best result for the
organization?
16. Enumerate and explain the different generations of firewall technology, and mention
which of these generations are still widely used today.
17. How can the effectiveness of different firewall rule sets be evaluated in terms of their
ability to balance security, performance, and user experience within varying network
environments? Explain with an example
18. What is a honeypot? How is it different from a honeynet?
19. How does a padded cell system differ from a honeypot?
20. What is network footprinting? What is network fingerprinting? How are they related?
21. What is a vulnerability scanner? Describe the types of vulnerability scanner
22. What kind of data and information can be found using a packet sniffer?
23. What is biometric authentication? What does the term biometric mean?
24. Discuss how vulnerability scanners and packet sniffers are used by network
administrators
25. Define biometric authentication and explain the different technologies used in
biometric authentication.
26. You are asked to develop an online university examination application, Identify the
various risk components.