BIOM 465

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

BIOM 465

KISII UNIVERSITY
UNIVERSITY EXAMINATIONS
FOURTH YEAR EXAMINATION FOR THE AWARD OF THE DEGREE OF
BACHELOR OF SCIENCE IN BIOMETRY AND INFORMATICS
SECOND SEMESTER 2023/2024
[JAN – APRIL, 2024]

BIOM 465: COMPUTER SECURITY

STREAM: Y4 S2 TIME: 2 HOURS

DAY: TUESDAY, 3:00 - 5:00 P.M. DATE: 16/04/2024

INSTRUCTIONS
1. Do not write anything on this question paper.
2. Answer question ONE (Compulsory) and any other TWO questions.
.

QUESTION ONE (30 MARKS)


a. What is computer security? (2 marks)
b. Discuss any two digital security principles. (6 marks)
c. Explain the importance of scan chain in hardware security. (4 marks)
d. i. Explain the term audit trial as used in system security. (2 marks)
ii. Discuss two audit trial methods. (6 marks)
e. State any three operations carried out to secure an operating system. (3 marks)
f. Explain the functions of Access Control List in networking. (4 marks)
g. What is public key cryptography? (2 marks)

QUESTION TWO (20 MARKS)


a. Discuss any three preventive measures to be taken against any disaster on a
computer system. (6 marks)
b. Explain two functions of a digital signature. (4marks)
c. Discuss four ways to safeguard computer system against viruses and worms.
(8 marks)
d. State two essential skills for a cybersecurity architect. (2 marks)

QUESTION THREE (20 MARKS)


a. Explain three types of intruders in computer security. (6 marks)
b. State the importance of secure coding in computer security. (4 marks)
c. Discuss three risks associated with network security intrusion. (6 marks)

Page 1 of 2
d. Explain why it is necessary to carry out disk cleanup in a computer. (4marks)

QUESTION FOUR (20 MARKS)


a. Describe how businesses protect themselves from the threats and risks of
information posed by technology. (8 marks)
b. What is cryptography in computer security? (4 marks)
c. Differentiate between intrusion detection system and intrusion prevention system.
(4 marks)
d. Explain the term trace-route in computer networking. (4marks)

QUESTION FIVE (20 MARKS)


a. Differentiate between encryption and hashing in computer security. (4marks)
b. Discuss three common cyber-attacks. (6 marks)
c. Explain the following terms as used in data security.
i.Threats (2 marks)
ii.Vulnarability (2 marks)
iii.Risk (2 marks)
d. Discuss the importance of penetration testing in computer security. (4 marks)

Page 2 of 2

You might also like