0% found this document useful (0 votes)
3 views4 pages

Network Lab

The document outlines the examination structure for the B.E/B. Tech degree in Network Security at Anna University for the April/May 2025 session. It includes various programming tasks related to encryption algorithms, intrusion detection systems, and network monitoring tools, along with viva-voce components. Each question is designed to assess practical implementation skills and understanding of network security concepts.

Uploaded by

sibilevis0219
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

Network Lab

The document outlines the examination structure for the B.E/B. Tech degree in Network Security at Anna University for the April/May 2025 session. It includes various programming tasks related to encryption algorithms, intrusion detection systems, and network monitoring tools, along with viva-voce components. Each question is designed to assess practical implementation skills and understanding of network security concepts.

Uploaded by

sibilevis0219
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

ANNA UNIVERSITY, CHENNAI – 600 025.

B.E/B. TECH. DEGREE EXAMINATIONS, APRIL/MAY 2025

REGULATIONS – 2021

SIXTH SEMESTER

COMMON TO B. E. - CSE & B. TECH. IT

CCS354 - NETWORK SECURITY

Time: 3 Hours Maximum Marks: 100

1. (a) Write a program to implement the concept of DES. (60)


(b) Demonstrate an intrusion detection system that monitors a network or systems for
malicious activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

2. (a) Write a program to implement the concept of AES. (60)


(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

3. (a) Write a program to implement the concept of RC4. (60)


(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

4. (a) Write a program to implement the concept of RSA. (60)


(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

5. (a) Write a program to implement the concept of DIFFIE HELLMAN. (60)


(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)
6. (a) Write a program to implement DIGITAL SIGNATURE SCHEMES. (60)
(b) Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

7. (a) Write a program to implement the concept of SSL to check message integrity
and confidentiality. (60)
(b Demonstrate an intrusion detection system that monitors a network or systems for malicious
activity or policy violations using any tool or software. (30)
(c) Viva – Voce (10)

8. (a) Write a program to implement the concept of DES. (60)


(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)

9. (a) Write a program to implement of concept of AES. (60)


(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)

10. (a) Write a program to implement the concept of RC4. (60)


(b) Installation of wireshark and observe data transferred in client-server communication using UDP/TCP
and identify the UDP/TCP datagram.. (30)
(c) Viva – Voce (10)

11. (a) Write a program to implement the concept of RSA. (60)


(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (30)
(c) Viva – Voce (10)

12. (a) Write a program to implement the concept of DIFFIE HELLMAN key exchange. (50)
(b) Installation of wireshark and observe data transferred in client-server communication using
UDP/TCP and identify the UDP/TCP datagram. (40)
(c) Viva – Voce (10)
13. (a) Write a program to implement the concept of AES .(60)
(b) Experiment the sniff traffic using ARP poisoning. (30)
(c) Viva – Voce (10)

14. (a) Write a program to implement the concept of RSA. (50)


(b) Experiment the sniff traffic using ARP poisoning (40)
(c) Viva – Voce (10)

15. (a) Write a program to implement the concept of Diffie Hellman key exchange. (60)
b) ) Experiment the sniff traffic using ARP poisoning. (30)
(c) Viva – Voce (10)

16. (a) Write a program to implement any one of symmetric key algorithm. (60)
(b) ) Experiment the sniff traffic using ARP poisoning (30)
(c) Viva – Voce (10)

17. (a) Write a program to implement the concept of RC4. (60)


(b) Experiment the Eavesdropping. (30)
(c) Viva – Voce (10)

18. (a) Write a program to implement the concept of RSA.(50)


(b Experiment the Eavesdropping. (40)
(c) Viva – Voce (10)

19. (a) Write a program to implement the concept of DIFFIE HELLMAN.(50)


(b Experiment the Eavesdropping. (40)
(c) Viva – Voce (10)

20. (a) Write a program to implement the concept of RSA.(50)


(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)
21. (a) Write a program to implement the concept of RC4.(50)
(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)

22. (a) Write a program to implement the concept of Diffie hellman.(50)


(b Experiment the Dictionary attacks. (40)
(c) Viva – Voce (10)

23. (a) Write a program to implement the concept of RSA.(50)


(b Experiment the MITM attacks. (40)
(c) Viva – Voce (10)

24. (a) Write a program to implement the concept of RC4.(50)


(b Experiment the MITM attacks. (40)
(c) Viva – Voce (10)

25. (a) Write a program to implement the concept of RSA.(60)


(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)

26. (a) Write a program to implement the concept of RC4.(60)


(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)

27. (a) Write a program to implement the concept of DIFFIE HELLMAN key exchange.(60)
(b Explore Network Monitoring Tools. (30)
(c) Viva – Voce (10)

28. (a) Write a program to implement the concept of RSA.(60)


(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)

29. (a) Write a program to implement the concept of RC4.(60)


(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)

30. (a) Write a program to implement the concept of DIFFIE HELLMAN.(60)


(b Study to configure Firewall,VPN. (30)
(c) Viva – Voce (10)

INTERNAL EXAMINER EXTERNAL EXAMINER

You might also like