RCS 433 - Network Security - Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

UNIVERSITY EXAMINATIONS

EXAMINATION FOR JANUARY / APRIL 2017/2018 FOR BACHELOR OF SCIENCE


IN COMPUTER SCIENCE
COURSE CODE: RCS 433 COURSE UNIT: NETWORK SECURITY
DATE _____________ TIME: 2 HOURS
GENERAL INSTRUCTIONS:
Students are NOT permitted to write on the examination paper during examination time.
This is a closed book examination. Text book/Reference books/notes are not permitted.

SPECIAL INSTRUCTIONS:
This examination paper consists Questions in Section A followed by section B.
Answer Question 1 and any Other Two questions.
QUESTIONS in ALL Sections should be answered in answer booklet(s).
1. PLEASE start the answer to EACH question on a NEW PAGE.
2. Keep your phone(s) switched off at the front of the examination room.
3. Keep ALL bags and caps at the front of the examination room and DO NOT
refer to ANY unauthorized material before or during the course of the
examination.
4. ALWAYS show your working.
5. Marks indicated in parenthesis i.e. ( ) will be awarded for clear and logical
answers.
6. Write your REGISTRATION No. clearly on the answer booklet(s).
7. For the Questions, write the number of the question on the answer booklet(s) in
the order you answered them.
8. DO NOT use your PHONE as a CALCULATOR.
9. YOU are ONLY ALLOWED to leave the exam room 30minutes to the end of the
Exam.
10. DO NOT write on the QUESTION PAPER. Use the back of your BOOKLET for
any calculations or rough work.

Page 1 of 4
SECTION A (COMPULSORY)
QUESTION ONE: [30 MARKS] COMPULSORY
a. Biometrics is used in computer and network security. Briefly explain what is meant by
biometrics in relation to authentication and state TWO types of biometric.
[6
Marks]

b. Information is frequently sent over email and THREE key requirements Confidentiality,
Integrity and Availability must be met. Briefly explain what is meant by confidentiality,
integrity and availability. [6 Marks]

c. Explain the following terms as used in cryptography and cryptanalysis [6 Marks]

i. Encoding

ii. Encryption

iii. Hashing

d. Describe the following terms as they are used in security risk management [6 Marks]

i. Risk Identification.

ii. Risk Assessment

iii. Risk Control

e. Differentiate between Asymmetric and Symmetric encryption explaining which type of


encryption is more secure over the other. [6 Marks]

SECTION B (ANSWER ANY TWO QUESTIONS)


QUESTION TWO: [20 MARKS]
a. Identify and Explain FIVE threats to wireless networks that could compromise security
[10
Marks]

b. Differentiate between the following terms as used in the encryption as a form of network
security measure [4 marks]

Page 2 of 4
i. Block cipher and Stream cipher

ii. Substitutions and Transpositions

c. Explain the main differences between a software firewall and a router firewall as a key tool in
network security management [6 Marks]

QUESTION THREE: [20 MARKS]


a. Define the following terms relating to network and data security [10 Marks]

i. Data encryption

ii. Public Key Encryption

iii. Digital Signatures

iv. Brute Force Attacks

v. Denial of Service

b. Explain the design goals of the firewall as a security measure and tool for enforcing
network security in an organization network [6 Marks]

c. Explain how Intrusion Prevention System is different from Intrusion Detection System
[4
Marks]

QUESTION FOUR: [20 MARKS]


a. Using a well labelled diagram, illustrate how the Public Key Cryptography work
[5
Marks]

b. Discuss the following terms as used in network security [10 marks]

i. Asset

Page 3 of 4
i. Attack

ii. Risk

iii. Vulnerability

iv. Exposure

c. Outline FIVE benefits of the Public Key Infrastructure (PKI) in enforcing information
security [5 Marks]

QUESTION FIVE: [20 MARKS]


a. Discuss the security policy development process which an organization need to follow to
be considered secure [10 Marks]

b. Describe the following terms as used in Network security [6 Marks]

i. Security attack

ii. Security mechanism

iii. Security services

c. Security Risk analysis report can be used to align technology-related objectives with a
company's business objectives. The risk analysis report can be either quantitative or
qualitative. Explain [4 Marks]

Page 4 of 4

You might also like