RCS 433 - Network Security - Exam
RCS 433 - Network Security - Exam
RCS 433 - Network Security - Exam
SPECIAL INSTRUCTIONS:
This examination paper consists Questions in Section A followed by section B.
Answer Question 1 and any Other Two questions.
QUESTIONS in ALL Sections should be answered in answer booklet(s).
1. PLEASE start the answer to EACH question on a NEW PAGE.
2. Keep your phone(s) switched off at the front of the examination room.
3. Keep ALL bags and caps at the front of the examination room and DO NOT
refer to ANY unauthorized material before or during the course of the
examination.
4. ALWAYS show your working.
5. Marks indicated in parenthesis i.e. ( ) will be awarded for clear and logical
answers.
6. Write your REGISTRATION No. clearly on the answer booklet(s).
7. For the Questions, write the number of the question on the answer booklet(s) in
the order you answered them.
8. DO NOT use your PHONE as a CALCULATOR.
9. YOU are ONLY ALLOWED to leave the exam room 30minutes to the end of the
Exam.
10. DO NOT write on the QUESTION PAPER. Use the back of your BOOKLET for
any calculations or rough work.
Page 1 of 4
SECTION A (COMPULSORY)
QUESTION ONE: [30 MARKS] COMPULSORY
a. Biometrics is used in computer and network security. Briefly explain what is meant by
biometrics in relation to authentication and state TWO types of biometric.
[6
Marks]
b. Information is frequently sent over email and THREE key requirements Confidentiality,
Integrity and Availability must be met. Briefly explain what is meant by confidentiality,
integrity and availability. [6 Marks]
i. Encoding
ii. Encryption
iii. Hashing
d. Describe the following terms as they are used in security risk management [6 Marks]
i. Risk Identification.
b. Differentiate between the following terms as used in the encryption as a form of network
security measure [4 marks]
Page 2 of 4
i. Block cipher and Stream cipher
c. Explain the main differences between a software firewall and a router firewall as a key tool in
network security management [6 Marks]
i. Data encryption
v. Denial of Service
b. Explain the design goals of the firewall as a security measure and tool for enforcing
network security in an organization network [6 Marks]
c. Explain how Intrusion Prevention System is different from Intrusion Detection System
[4
Marks]
i. Asset
Page 3 of 4
i. Attack
ii. Risk
iii. Vulnerability
iv. Exposure
c. Outline FIVE benefits of the Public Key Infrastructure (PKI) in enforcing information
security [5 Marks]
i. Security attack
c. Security Risk analysis report can be used to align technology-related objectives with a
company's business objectives. The risk analysis report can be either quantitative or
qualitative. Explain [4 Marks]
Page 4 of 4