The use of 56-bit keys: 56-bit key is used in encryption, there are 256 possible keys. A brute force attack on such number of keys is impractical. The nature of algorithm: Cryptanalyst can perform cryptanalysis by exploiting the characteristic of DES algorithm but no one has succeeded in finding out the weakness.
Two chosen input to an S-box can create the same output. The purpose of initial and final permutation is not clear
Q2. If you are a victim of Denial of Service (Dos) then what you do?
The function of a denial of service attack is to flood its target machine with too much traffic and prevents it from being accessible to any other requests or providing services.
To prevent DoS attacks firewall can be configured as a relay; in this approach the firewall responds on behalf of the internal host. During the attack, the firewall responds to the SYN sent by the attacker; since the ACK never arrives, the firewall terminates the connection. By Keeping protocols and Antivirus software up-to-date, we can prevent to be a victim of DoS. A regular scanning of the machine is also necessary in order to detect any anomalous behavior.
Q4. How do you use RSA for both authentication and secrecy?
RSA is a public key encryption algorithm. The RSA algorithms are based on the mathematical part that it is easy to find and multiply large prime numbers together, but it is extremely difficult to factor their product. For authentication: One can encrypt the hash (MD4/SHA) of the data with a private key. This is known as digital signature.
For Secrecy: Secrecy/confidentiality is achieved by encrypting the data with public key and decrypting with private key.
Q6. If you have to generate a hash function then what characteristics are needed in a secure hash
function?
A secure hash function should have the following characteristics: i. The output generated by a hash function should be of a fixed length. ii. It should be very easy to find out a hash function for a given message. iii. If a hash value is given of a message than it is almost impossible to get that message. iv. The two different messages should not have the same hash value; it is against the hash function property.
Q7. What is digital signature? Differentiate between Physical and Digital Signature
A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance that the claimed signatory signed the information. Digital signature is used to detect the integrity of signed data. We can differentiate between physical and digital signature as: i. Physical signature is just writing on paper but digital signature includes crucial parameters of identification. ii. Physical signature can be coped but it is impossible to copy a digital signature. iii. Physical signature does not give any privacy to content but digital signature enables encryption and thus privacy
Q8. What is Authentication Header and how it provides the protection to IP header?
Basically Authentication Header protects IP header and provides the complete authenticity to the IP packets. AH may work in two ways: transport mode and tunnel mode. In tunnel mode; AH protects the IP header using two IP header layers inner and outer. Inner IP header is used to contain the source and destination addresses, and the outer IP header is used to contain the security gateway information
Q9. Explain SSL Protocol. How does it protect internet users from various threats?
The SSL protocol (Secure Socket Layer protocol) was originally developed by Netscape, to ensure security of data transported and routed through HTTP, LDAP or POP3 application layer. SSL uses TCP as a communication layer to provide a reliable end-to-end secure and authenticated connection; which helps internet users to protect from various threats. SSL Record protocol is used to ensure the data security and integrity
Q10. What is PIX firewall security? How does it differ from a firewall?
PIX (Private Internet Exchange) It is a popular IP firewall and NAT (Network Address Translation) appliance. PIX firewall security is developed by Cisco Systems. PIX firewall is used to protect your network with a stateful packet filtering firewall. A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications.
Q13. If you have to encrypt as well as compress data during transmission then which would you
do first and why?
Data should be transmitted over any communication network in such a way that the data integrity and authenticity should be maintained, for this first compress the data and then encrypt the data. The reason behind it is; if you encrypt first you will have nothing but random data to work with, which will destroy any potential benefit from compression.
Q16. Explain the services provided by IP (Internet Protocol) - Addressing, Fragmentation, Packet
timeouts and options
1. Addressing: For the purpose of delivering datagram packets, IP needs to know about the address of the destination. By including the host addressing, this task is carried out by IP. As IP operates in an internet, its systems are designed to accept the addressing of devices which are unique. 2. Fragmenting: The datagram packets are sent to the data link layer for the purpose of transmission on the network. The physical network frame size that uses IP may be different. To resolve this, IP fragments the datagram into certain pieces. So that, each piece can be carried on the network. The receiving systems use these pieces and reassemble the whole IP datagram again.
3. Packet timeouts: A timeout packet is the time for waiting next instruction from the command station. If the command is not sent by the station, it shuts down
Breaking the networking into smaller and more efficient subnets is known as subnets. Subnetting prevents Ethernet packet collision which has excessive rates in a large network. Routers are used to manage the traffic and constitute borders among subnets.
Remote Access VPN:- Also called as Virtual Private dial-up network (VPDN) is mainly used in scenarios where remote access to a network becomes essential. Remote access VPN allows data to be accessed between a companys private network and remote users through a third party service provider; Enterprise service provider. E.g Sales team is usually present over the globe. Using Remote access VPN, the sales updates can be made. Site to Site VPN Intranet based: This type of VPN can be used when multiple Remote locations are present and can be made to join to a single network. Machines present on these remote locations work as if they are working on a single network. Site to Site VPN Extranet based: This type of VPN can be used when several different companies need to work in a shared environment. E.g. Distributors and service companies. This network is more manageable and reliable.
EAP authentication method: Extensible authentication protocol authenticates remote access connection. The authentication mechanism is decided between the remote VPN client and authenticator (ISA). The mechanism is typical in which authenticator requests for authentication information and the responses are given by the remote VPN client. MS Chap Authentication method: Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) starts with the authenticator (Remote access server) challenge. The challenge to the remote access client sends a session identifier and challenge string. The client in response sends the nonreversible encryption of
the string, the identifier and password. Authenticator checks the credentials and grants access on a successful authentication. Unencrypted passwords (PAP):- Uses plain text passwords. Does not involve encryption. Used for less secure clients. Shiva Password Authentication Protocol (SPAP):- It is a password authentication protocol. It is less secure as the same user password is always sent in the same reversibly encrypted form
Q31. What is
RTP?
Real-Time Transfer Protocol lays a standard or a way to transfer or manage real time data over a network. It does not guarantee the delivery of data or provide any quality of service. However it helps to manage the data. Which means
that RTP can be used deliver the necessary data to the application to make sure it can put the received packets in the correct order Real time data examples could be audio and video.
Q42. What are the two important TCP Socket classes? Explain them
The two most important socket Classes are:
Socket Class: The Socket class provides enriched methods and properties for network communications. It allows both synchronous and asynchronous data transfer. Shutdown method should be used to end the Socket once the data transfer is complete. Using SetSocketOption the socket can be configured. Declaration: Public Class Socket _ Implements IDisposable Server Socket Class: The server Socket class is used to implement server sockets. Server sockets are used to respond to requests received over the network.
Q43.
What are the advantages and disadvantages of Java Sockets?
Advantages:
Flexible and powerful. Cause low network traffic if efficiently used. Only updated information can be sent.
Disadvantages:
The Java applets can establish communication only with the machine requested and not with any other machine on the network. Sockets allow only raw data to be sent. This means that both client and server need to have mechanisms to interpret the data.
Q44. What is race condition? How does the race condition occur?
A race condition occurs when there are two or more processes trying to access the same data concurrently or performing the same operation concurrently. Output of the operation depends on the sequence of requests of the operations. In networking, a race condition occurs when two or more try to access the same channel. This usually occurs in networks having lag times. In a computer memory, a race condition occurs when a request to read and write data is received at the same time. In logic gates, a race condition occurs when some inputs encounter conflicts
Q48.What is the difference between TFTP and FTP application layer protocols?
The differences between FTP and TFTP: FTP is connection oriented, where as TFTP is not. TFTP uses error checking and flow control, where as TFTP does not cause error checking. FTP uses TCP as transport protocol, where as TFTP uses UDP as transport protocol. Authentication is mandatory in FTP, where as authentication is not needed in TFTP. Just getting and putting application effectively is the design concern of TFTP, where as FTP provides more control and data connection aspects.
Q52. What is the difference between POP3 and IMAP Mail Server?
POP3: All emails are to be downloaded again if used by another desktop PC for checking the email. May leads to confusion if used for checking email in office and at home pc. Attachments will be down loaded into desktop while the check new email process is in progress. Mailboxes can be created only on desktop and one mail box exists on the server. IMAP: There is no need for downloading all email while using another desktop PC for checking email. Unread mail identification is easier. Message downloading is possible only when opened for display from its contents. Multiple mailboxes creation is possible on the desktop PC and also on the server