0% found this document useful (0 votes)
3 views2 pages

NSM Assignment Questions

The document outlines assignments for a Network Security & Management course at LJ Polytechnic, Ahmedabad, covering topics from Units 1 to 5. It includes detailed questions on the CIA Triad, security attacks, various cipher techniques, firewalls, IPSec modes, and differences between IPv4 and IPv6. Submission dates for the assignments are specified as 7/8/2025 and 11/9/2025.

Uploaded by

ahesan.agk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

NSM Assignment Questions

The document outlines assignments for a Network Security & Management course at LJ Polytechnic, Ahmedabad, covering topics from Units 1 to 5. It includes detailed questions on the CIA Triad, security attacks, various cipher techniques, firewalls, IPSec modes, and differences between IPv4 and IPv6. Submission dates for the assignments are specified as 7/8/2025 and 11/9/2025.

Uploaded by

ahesan.agk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LJ Polytechnic, Ahmedabad

CE-IT-AIML-CC-GA [Semester-5]
Network Security & Management

Assignment-1 (Unit 1, 2) Tentative


Submission Date
Q# Question
1 Explain CIA Triad in detail with diagrams.
2 Explain various types of Security Attacks in detail with diagrams.
3 Explain Symmetric Cipher Model in detail with diagram.
Perform Encryption and Decryption on the following using the Shift Cipher Substitution
4
Technique: Plain Text = "Your Name", Key = "12".
Perform Encryption and Decryption using the Playfair Cipher Substitution Technique where 7/8/2025
5
Plain Text should be a word with repeated plain text letters in the same pair and Key = "Text"
Perform Encryption and Decryption on the following using the Vigenere Cipher Substitution
6
Technique: Plain Text = "AUTOSUM", Key = "FIND"
Explain Hill Cipher Substitution Technique with example (Length of Plain Text and Key Matrix
7
should be 3x3).

Assignment-2 (Unit 3, 4, 5) Tentative


Submission Date
Q# Question
1 Define Firewall. Explain any two types of Firewalls in detail.
2 Explain Tunnel Mode and Transport Mode of IPSec in detail.
3 Write down the difference between IPv4 and IPv6. 11/9/2025
4 Explain X.500 Directory Architecture in detail.
5 Explain DORA process of DHCP in detail. (without using relay agent and with using relay agent).

You might also like