Cybersecurity Exam Questions
Cybersecurity Exam Questions
com
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
UNIT-I
1 Explain security attacks? Understand 1,2
2 Enumerate traffic analysis? Knowledge 1,2
3 Categorize active attacks? Apply 1,2
4 Categorize passive attacks? Apply 1,2
5 Mention the key principles of security? Compare 1,2
6 Distinguish active and passive attacks? Understand 2
7 Enumerate the mechanisms implemented for confidentiality? Knowledge 2
8 List briefly categories of security mechanisms? Knowledge 2
9 Differentiate TCP and UDP session hijacking? Apply 2
10 Specify basic tasks for defining a security services? Compare 2
UNIT – II
1 Differentiate symmetric and asymmetric encryption? Apply 3,5
2 Define cryptanalysis? Knowledge 3
3 Compare stream and block ciphers with examples? Understand 3,4
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
UNIT-I
1 Demonstrate the network model? Understand 2
2 Draw matrix that shows the relationship between security
Knowledge 1
mechanisms and attacks?
UNIT – II
1 Demonstrate RC4 key value will leave S unchanged during
initialization. That is , after the initial permutation of S, the
Understand 3
entries of S will be equal to the values from 0 through 255 in
ascending order?
2 Discuss the security implications of following centralization?
Key distribution schemes using an access control centre and/or
Knowledge 4
a key distribution centre have central points. vulnerable to
attack
3 Can RC4 be used in either CBC or EBC modes? Apply 3
4 RC4 has a secret internal state which is a permutation of all
possible values of the vector S and the two indices i and j
Apply 3
(a) Using a straightforward scheme to store the internal state,
how many bits are used?
UNIT – III
1 Consider RSA cipher with n=383*563=215629 and e=49.The
plain text, n, is encrypted with c=E (m) =m49modulo n. Show
Understand 5
that for each encrypted text c, E10(c) =c holds. Find a simple
way for a cryptanalyst to find the plain text m from c?
2 Consider a Diffie-Hellman scheme with a common prime q=11
and a primitive root $=2
(a) If user A has a public key YA=9, What is A’s private key
Knowledge 5
XA
(b) If user B has a public key YB=3, What is the shared secret
key k
3 Suppose we have a set of blocks encoded with RSA algorithm
and we don’t have the private key. Assume n-pq, e is the public
key. Suppose also someone tells us they know one of the plain Apply 5
text blocks has a common factor with n. Does this help us in
any way?
4 In public –key system using RSA, you intercept the cipher text
C=10 sent to a user whose public key e=5, n-35. What is the Apply 5
plaintext M?
5 Demonstrate the shortcomings of Kerberos version 4 and how
Understand 6
Are they addressed in version 5?
6 Suppose that, in PCBC mode, blocks Ci and Ci+1 are
interchanged during transmission. Show that this affects only Knowledge 6
the decrypted blocks Pi and Pi+1 but not subsequent blocks?
UNIT – IV
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
1 PGP makes use of cipher feedback (CFB) mode of CAST-128,
whereas most symmetric encryption applications (other than
key encryption) use the cipher block chaining (CBC) mode. We
have
CBC: Ci = E(K, [Ci-1 ex-or Pi]);
Understand 7
Pi = Ci-1 ex-or D(K, Ci)
CFB: Ci = Pi ex-or E(K,Ci-1);
Pi = Ci ex-or E(K, Ci-1)
These two appear to provide equal security. Suggest a reason
why PGP uses the CFB mode?
2 In the PGP scheme, what is the expected number of session
Knowledge 7
keys generated before a previously created key is produced?
3 Consider radix-64 conversion as a form of encryption. In this
case, there is no key. But suppose that an opponent knew only
that some form of substitution algorithm was being used to Apply 7
encrypt English text and did not guess it was R64. How
effective would this algorithm be against cryptanalysis?
4 Demonstrate different cryptographic algorithms used in
Apply 7,8
S/MIME. Explain how S/MIME is better than MIME?
UNIT – V
1 Explain the different payloads of ISAKMP for authentication
Understand 9
and non- repudiation?
2 The IPSEC architecture document states that when two
transport mode SA’s are bundled to allow both AH and ESP
protocols on the same end-to-end flow, only one ordering of
security protocols seems appropriate: performing the ESP Knowledge 9
protocol before performing the AH protocol. Why is this
approach recommended rather than authentication before
encryption?
3 When tunnel mode is used, a new outer IP header is
constructed. For both IPV4 and IPV 6, indicate the relationship
of each outer IP header field and each extension header in the
outer packet to the corresponding field or extension header of Apply 9
the inner IP packet. That is, indicate which outer values are
derived from inner values and which are constructed
independently of the inner values?
4 In discussing AH processing, it was mentioned that not all of
the fields in an IP header are included in MAC calculation.
(a) For each of the fields in the IPV4 header, indicate
whether the field is immutable, mutable but predictable, or
Apply 9
mutable(zeroed prior to ICV calculation)
(b) Do the same for the IPV6 header
(c) Do the same for the IPV6 extension headers
In each case, justify your decision for each field
UNIT – VI
1 In SSL and TLS, why is there a separate Change Cipher Spec
Protocol, rather than including a change_cipher_spec message Understand 11
in the handshake protocol?
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
2 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) Brute-Force Cryptanalytic Attack: An exhaustive search Knowledge 11
of the key space for a conventional encryption algorithm
(b) Reply attack: Earlier SSL handshake message are replayed
3 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) Man-in-Middle Attack: An attacker interposes during key
exchange, acting as the client to the server and as the Apply 11
server to the client
(b) IP Spoofing: Uses forged IP addresses to fool a host into
accepting bogus data
4 Consider the following threats to web security and describe
how each is countered by a particular feature of SSL.
(a) IP Hijacking: An active, authenticated connection between
two hosts is disrupted and the attacker takes the place of
one of the hosts
(b) SYN Flooding: An attacker sends TCP SYN message to Knowledge 11
request a connection but does not respond to the final
message to establish the connection fully. The attacked
TCP module typically leaves the “half=open connection”
around for a few minutes. Repeated SYN messages can
clog the TCP module
UNIT - VII
1 Why does SNMP use unreliable UDP datagram? What would
be the reason for the designer to choose UDP instead of TCP for Understand 13
the transport protocol for SNMP?
2 In SNMPv1, any object in an MIB is defined as having an MIB
Access Category, which can be assigned one of the following
values: read-only, read-write, write-only, and not-accessible. A
read is accomplished with a get or trap operation, and a write is
accomplished with a set operation. In the following table, fill in
each entry to show the access allowed
MIB Access Category SNMP Access Mode Knowledge 13
READ-ONLY READ-WRITE
Specworld.in jntuworld.xyz
smartworld.asia smartzworld.com
Bloom’s Course
S. No. Questions
Taxonomy Level Outcome
1 The question arises as to whether it is possible to develop a
program that can analyze a piece of software to determine if it is
a virus.
Program CV :=
{ ……
main-program :=
{ if D(CV) then goto next:
Else infect-executable; Understand 16
}
next:
}
In the proceeding program, infect-executable is a module that
scans memory for executable programs and replicates itself in
those programs. Determine if D can correctly decide whether
CV is a virus?
2 How does the behaviour-blocking software monitor the
Knowledge 15
program behaviour in real-time systems?
3 The necessity of the “no read up” rule for a multilevel secure
system is fairly obvious. What is the importance of the “no Apply
write down” rule?
4 Describe how firewall can be used to protect the network
against the following attacks.
(a) SMTP Server Hijacking( Unauthorized Relaying)
(b) Exploiting Bugs in Applications
Apply 15,16
(c) Bugs in Operating Systems
(d) ICMP Flooding
(e) Ping of Death
(f) Sub-seven Trojan
Specworld.in jntuworld.xyz