Final Exam IS433
Final Exam IS433
Final Exam IS433
Student ID:
Section No.:
Instructions:
1. Answer All questions; there are __3__ questions in __5__ pages.
2. Answer should be in hand-writing using pen.
3. Write your name on each page of the answer paper.
4. Write your answers by clearly specifying the question number.
5. If information appears to be missing from a question, make a reasonable assumption, state
your assumption, and proceed.
6. If due to any reason, you cannot upload the answer file to the LMS you can email it using
your official imam university email to the instructors email before the end of the exam
duration.
7. Any electronic submission by you after exam duration will not be accepted.
8. No questions will be answered by the invigilator(s) during the exam period.
9. Instructors email [email protected]
3. Nowadays, malicious activities have been raised widely, and the main types of
that activities are formed of viruses and worms, what is the main difference
between virus and worm:
a) Virus strong than worm
b) Virus less spread than worm
c) Virus can be detected
d) All the above
5. A protocol that uses symmetric key, time stamp and is used for single-sign on is
called:
a) SSH
b) SSL
c) Kerberos
d) WEP
6. _________ is a type of malware in which each infection utilizes a different
cryptographic key causing the main code to appear completely different on each
system.
a) Encrypted virus
b) Flash worm
c) Botnet
d) All of the above
10. In Kerberos protocol, the timestamp was used to increase the efficiency of the
protocol and decreased number of messages instead of using challenge-response
mechanism.
a) TRUE.
b) FALSE
A) Your organization used Kerberos security protocol to authenticate its users when
they login to the server domain. In this case, what server represent, and why it
should be protected? [1 Mark]
C) Why can Ahmad not remain anonymous when requesting a TGT from the KDC?
[1 Mark]
D) Ahmed wants to copy file from Fileserver, then Kerberos will provide Ahmed
with shared key with Fileserver. Why this situation happened in Kerberos? [1
Mark]
Coronavirus is pandemic which hit the world in January 2020, it first appeared
in China – Wuhan city. This pandemic known by COVID-19 as scientific
medical name and it classified as dangerous virous. However, bad guys
(hacker) exploited this pandemic and abuse this panic to launch special
malware, cyber attack and/or phishing attack.
You are working in cybersecurity department, and you have been asked to take
countermeasure to protect your organization from malicious COVID-19 attack.
A) If you received an email stated that, “see the last updated number of infected
people with Coronavirus on the next link ”, If you click on the link t will launch
you to website (www.covid19.com) , and you observe the certificate for this
website and it looks like:
C) According to the current rates and indicators of the spread of the novel
Coronavirus, the Ministry of health working hard to reduce the infected cases
with covid19. What is the best methods for preventing an illegal or unethical
activity with examples. [2 Marks]
END QUESTIONS
GOOD LUCK