Skip to main content
Cyber Security (4353204) - Unit 1 & Unit 2 Question Bank
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/

Cyber Security (4353204) - Unit 1 & Unit 2 Question Bank

Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Government Polytechnic Palanpur
#

Information & Communication Technology
#

Cyber Security (4353204) - Unit 1 & Unit 2 Question Bank
#

Subject Name & Code: Cyber Security (4353204)
Semester: 5
Coverage: Unit 1 & Unit 2
Question Types: Short Answer & Long Answer


Unit I: Introduction to Cyber Security & Cryptography
#

Important Questions from Unit 1
#

Question 1 [7 marks]
#

Explain various security attacks, mechanisms, and services associated with each layer of the OSI model.

Answer:

OSI Security Framework:

OSI Security Framework

LayerAttacksMechanismsServices
PhysicalWiretapping, JammingPhysical security, ShieldingAccess control
Data LinkMAC flooding, ARP poisoningEncryption, AuthenticationFrame integrity
NetworkIP spoofing, Routing attacksIPSec, FirewallsPacket filtering
TransportSession hijacking, SYN floodingSSL/TLS, Port securityEnd-to-end security
SessionSession replay, HijackingSession tokens, TimeoutsSession management
PresentationData corruption, Format attacksEncryption, CompressionData transformation
ApplicationMalware, Social engineeringAntivirus, User trainingApplication security

Key Security Services:

  • Authentication: Verifying user identity
  • Authorization: Controlling access permissions
  • Non-repudiation: Preventing denial of actions
  • Data integrity: Ensuring data accuracy

Mnemonic: “All People Seem To Need Data Protection”

Question 2 [3 marks]
#

Describe CIA triad with example.

Answer:

CIA Triad Components:

CIA Triad

ComponentDefinitionExample
ConfidentialityProtecting data from unauthorized accessPassword protection on bank accounts
IntegrityEnsuring data accuracy and completenessDigital signatures on documents
AvailabilityEnsuring systems are accessible when needed24/7 online banking services
  • Confidentiality: Only authorized users can access sensitive information
  • Integrity: Data remains accurate and unaltered during transmission
  • Availability: Systems remain operational and accessible to legitimate users

Mnemonic: “CIA Keeps Information Safe”

Question 3 [7 marks]
#

Explain MD5 hashing and Secure Hash Function (SHA) algorithms.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

Packet Filter vs Application Proxy

Key Differences:

FeaturePacket FilterApplication Proxy
SpeedFastSlower
SecurityBasicAdvanced
Resource UsageLowHigh
Content InspectionHeader onlyFull content

Answer:

Hash Function Comparison:

Hash Function Process

FeatureMD5SHA-1SHA-256
Output Size128 bits160 bits256 bits
Security LevelWeakWeakStrong
SpeedFastModerateSlower
Current StatusDeprecatedDeprecatedRecommended

MD5 Algorithm Process:

  1. Input Processing: Message is padded and divided into 512-bit blocks
  2. Initialization: Sets up four 32-bit registers with fixed values
  3. Compression: Processes message in 16-word blocks through four rounds of operations
  4. Output: Produces 128-bit digest as final hash value

SHA Algorithm Features:

  • Deterministic: Same input produces same hash
  • Avalanche Effect: Small input change causes major hash change
  • One-way Function: Cannot reverse hash to original data
  • Collision Resistant: Difficult to find two inputs with same hash

Applications:

  • Password storage and verification
  • Digital signatures and certificates
  • Data integrity verification

Mnemonic: “Hash Always Produces Same Output”

Question 4 [3 marks]
#

Explain Public key and Private Key cryptography.

Answer:

Public Key Cryptography (Asymmetric):

Public Key Cryptography

Key Characteristics:

FeaturePublic KeyPrivate Key
DistributionFreely sharedKept secret
UsageEncryption/VerificationDecryption/Signing
SecurityCan be publicMust be protected
  • Public Key: Used for encryption and signature verification
  • Private Key: Used for decryption and digital signing
  • Security: Based on mathematical complexity (RSA, ECC algorithms)

Example: In RSA encryption, if Alice wants to send Bob a message:

  1. Alice encrypts with Bob’s public key
  2. Only Bob can decrypt using his private key

Mnemonic: “Public Encrypts, Private Decrypts”


Unit II: Account and Data Security
#

Important Questions from Unit 2
#

Question 5 [7 marks]
#

Explain working of packet filter and application proxy.

Answer:

Firewall TypeWorking
Packet FilterExamines packet headers based on predefined rules. Makes decisions based on source/destination IP addresses, ports, and protocols. Works at OSI network and transport layers. Offers high-speed filtering with low resource usage.
Application ProxyActs as intermediary between client and server applications. Processes all traffic at application layer. Creates two connections (client-to-proxy and proxy-to-server). Provides content inspection and user authentication capabilities.

Diagram:

Packet Filter vs Application Proxy

Key Differences:

FeaturePacket FilterApplication Proxy
SpeedFastSlower
SecurityBasicAdvanced
Resource UsageLowHigh
Content InspectionHeader onlyFull content

Mnemonic: “Packets Check Headers, Proxies Check Content”

Question 6 [3 marks]
#

What is authentication? Explain different methods of authentication.

Answer:

Authentication Definition: Process of verifying user identity before granting system access.

Authentication Methods:

Authentication Methods

MethodDescriptionExample
PasswordSomething you knowPIN, passphrase
BiometricSomething you areFingerprint, iris
TokenSomething you haveSmart card, USB key
  • Single-Factor: Uses one authentication method
  • Multi-Factor: Combines multiple methods
  • Two-Factor (2FA): Uses exactly two factors

Mnemonic: “Password Biometric Token Authentication”

Question 7 [7 marks]
#

Explain different types of malicious software and their effect.

Answer:

Malware Classification:

Malware Classification

TypeBehaviorEffectExample
VirusAttaches to filesFile corruptionBoot sector virus
WormSelf-replicatingNetwork congestionConficker worm
TrojanDisguised malwareData theftBanking Trojans
RansomwareEncrypts filesData hostageWannaCry
SpywareMonitors activityPrivacy breachKeyloggers
AdwareShows unwanted adsPerformance degradationPop-up ads
RootkitHides presenceSystem compromiseKernel rootkits

Effects on Systems:

  • Performance: Slow system response
  • Data: Loss, corruption, or theft
  • Privacy: Unauthorized monitoring
  • Financial: Direct monetary loss

Prevention Methods:

  • Regular antivirus updates
  • Safe browsing practices
  • Email attachment caution
  • System security patches

Mnemonic: “Viruses Worms Trojans Really Steal All Resources”

Question 8 [3 marks]
#

What is firewall? List out types of firewalls.

Answer:

Firewall Definition: Network security device that monitors and controls incoming/outgoing traffic based on security rules.

Firewall Architecture

Types of Firewalls:

TypeFunctionLevel
Packet FilterExamines packet headersNetwork Layer
StatefulTracks connection stateTransport Layer
Application ProxyInspects application dataApplication Layer
Personal FirewallProtects individual devicesHost-based
  • Hardware Firewall: Dedicated network appliance
  • Software Firewall: Installed on individual computers
  • Cloud Firewall: Delivered as a service (FWaaS)

Mnemonic: “Firewalls Protect Networks Always”


Study Tips for Unit 1 & Unit 2
#

Unit 1 Focus Areas
#

  1. Security Fundamentals - OSI model security layers
  2. CIA Triad - Core principles of information security
  3. Cryptography Basics - Hash functions and encryption types

Unit 2 Focus Areas
#

  1. Network Security - Firewalls, packet filtering, proxies
  2. Authentication Systems - Methods and multi-factor authentication
  3. Malware Analysis - Types, effects, and prevention strategies

Exam Preparation Tips
#

  • Practice drawing network diagrams and security frameworks
  • Memorize comparison tables for different security technologies
  • Understand real-world applications of theoretical concepts
  • Focus on the working principles behind security mechanisms
  • Review mnemonics for better concept recall

Key Topics Coverage
#

  • Unit 1: Introduction to Cyber Security, Security Models, Cryptographic Foundations
  • Unit 2: Network Security, Authentication Mechanisms, Threat Analysis

Note: These questions cover fundamental concepts from Unit 1 and Unit 2 that are commonly asked in examinations. Practice these thoroughly for better understanding of cyber security principles.