QUOTE

welcome

welcome to our college social blog
we have lot of information about our college fest and events etc
all of our college members join in this site .
to add to this blog
click on follow then select google
after that log in with your gmail id
thank you
KARTHIK REDDY.

Tuesday, March 15, 2011

IS IMPORTANT QUESTIONS

1. wrt abt a)security attacks b)security services
2. wrt abt a model for internetwork security
3. wrt abt buffer overflow & format string vulnerabilities
4. wrt abt a)route table modification b)man-in-the middle attack
5. wrt abt conventional encryption principles
6. wrt abt a)substitution cipher b)transposition cipher
7. wrt abt DES
8. wrt abt cipher block modes of operation(ECM,CBC,CFB,OFB)
9. wrt abt key distribution approaches of message authentication
10. wrt abt HMAC
11. wrt abt RSA
12. wrt abt digital signatures
13. wrt abt key management using kerberos
14. wrt abt x.509 authentication service

15. explain PGP
16. explain S/MIME
17. wrt abt IP security architecture
18. wrt abt autheutication header
19. wrt encapsulating security payload
20. wrt abt SSL(secure socket layer)
21. wrt abt TLS(transport layer security)
22. wrt abt SNMP
23. wrt abt a)intruders b)viruses and related threats
24. explain firewall desing principles
25. wrt abt intrusion detection system

No comments:

Post a Comment

JNTU WORLD

Add This Transparent Notification Bar To Your Blog Transparent Notification Bar

X