Sr. # Question Sr.
# Question
1 Computer Security 41 Routing Control
2 Network Security 42 Notarization
3 Internet Security 43 Cipher text
4 What are the 3 aspects of security? 44 Cipher
5 Define Security attacks. 45 Key
6 Define Security service. 46 ENCRYPT
7 Define Security mechanism 47 DECRYPT
8 Define cryptanalysis? 48 CRYPTOGRAPHY
9 Define Steganography 49 CODEBREAKING
10 What are the two basic functions used in encryption 50 CRYPTOLOGY
algorithms?
11 Define Threat and attack. 51 Substitution
12 What are the two approaches to attacking a cipher? 52 Transposition
13 Differentiate b/w passive attack from active attack 53 Symmetric Cryptography
with example.
14 What is masquerade? 54 Asymmetric Cryptography
15 What is Reply? 55 Data in Transit
16 Define Denial of service Attack. 56 Data at rest
17 Define Distributed Denial of service Attack. 57 Public Key Cryptography
18 Compare Substitution and Transposition techniques. 58 Hash Function
19 Define Interruption with Example 59 Differentiate b/w Hacker and Intruder
20 Interception with Example 60 Types of Steganography
21 Modification with Example 61 Applications of Cryptography
22 Define integrity with Example 62 Block cypher
23 Define Non repudiation with Example 63 Stream cypher
24 Define Fabrication with Example 64 Cipher text only Attack
25 Differentiate symmetric and asymmetric encryption? 65 Known plaintext attack.
26 What is Confidentiality? 66 Brute Force Attack
27 Define Authentication and its types. 67 What is TTP
28 Define Peer entity authentication. 68 Describe the Generic network security model.
29 Data origin authentication. 69 Describe the network access security model.
30 Write the types of integrity. 70 OSI security architecture
31 Define Connection-Oriented Integrity Service
32 Define Connectionless-Oriented Integrity Service
33 Access Control
34 Availability
35 Write the names of Specific Security Mechanisms.
36 Define Encipherment.
37 Define Digital Signature
38 Define Data Integrity.
39 Authentication Exchange
40 Traffic Padding.