1. wrt abt a)security attacks b)security services
2. wrt abt a model for internetwork security
3. wrt abt buffer overflow & format string vulnerabilities
4. wrt abt a)route table modification b)man-in-the middle attack
5. wrt abt conventional encryption principles
6. wrt abt a)substitution cipher b)transposition cipher
7. wrt abt DES
8. wrt abt cipher block modes of operation(ECM,CBC,CFB,OFB)
9. wrt abt key distribution approaches of message authentication
10. wrt abt HMAC
11. wrt abt RSA
12. wrt abt digital signatures
13. wrt abt key management using kerberos
14. wrt abt x.509 authentication service
15. explain PGP
16. explain S/MIME
17. wrt abt IP security architecture
18. wrt abt autheutication header
19. wrt encapsulating security payload
20. wrt abt SSL(secure socket layer)
21. wrt abt TLS(transport layer security)
22. wrt abt SNMP
23. wrt abt a)intruders b)viruses and related threats
24. explain firewall desing principles
25. wrt abt intrusion detection system
2. wrt abt a model for internetwork security
3. wrt abt buffer overflow & format string vulnerabilities
4. wrt abt a)route table modification b)man-in-the middle attack
5. wrt abt conventional encryption principles
6. wrt abt a)substitution cipher b)transposition cipher
7. wrt abt DES
8. wrt abt cipher block modes of operation(ECM,CBC,CFB,OFB)
9. wrt abt key distribution approaches of message authentication
10. wrt abt HMAC
11. wrt abt RSA
12. wrt abt digital signatures
13. wrt abt key management using kerberos
14. wrt abt x.509 authentication service
15. explain PGP
16. explain S/MIME
17. wrt abt IP security architecture
18. wrt abt autheutication header
19. wrt encapsulating security payload
20. wrt abt SSL(secure socket layer)
21. wrt abt TLS(transport layer security)
22. wrt abt SNMP
23. wrt abt a)intruders b)viruses and related threats
24. explain firewall desing principles
25. wrt abt intrusion detection system