Security of Computer Systems (CSCT4104)

Computer Science - COS

Semester: First Semester

Level: 400

Year: 2015

Page 1 of 2
SCHOOL: H.T.T.T.C DEPARTEMENT: CS LECTURER(S): Dr. Suh Charles Forbacha
COURSE CODE: CSC316 COURSE TITLE: Security of Computer Systems OPTION: FCS 300
DATE: HALL: …….. TIME: 2 hrs NATURE: EXAM
INSTRUCTION: Please note that the mark that you achieve from this examination will count toward
70% of your final mark for this module.
The following questions are multiple choice. So please select the correct answer from options a-d. NB:
Please note that only one of the answers (a-d) is correct.
1) The main aim of cryptography is to provide a mechanism for two or more people: 1 mark
(a) To communicate while anyone else is capable of reading their message(s)
(b) To communicate without anyone else being able to read their message(s)
(c) To communicate while allowing anyone else to be able to decipher their message(s)
(d) To communicate but without keeping anything hidden from anyone else
2) A situation in which hackers target a network or web server from many sources by sending several thousands of false communications
which leads to unavailability of services is known as: 1 mark
(a) Distributed social engineering attack
(b) Distributed trust access attack
(c) Distributed protocol service attacks
(d) Distributed Denial of service attacks
3) A mechanism that is used to protect information, networks and the Internet is referred to as: 1 mark
(a) Intrusion
(b) Network hardware
(c) Protocols
(d) Authentication
4) An Intranet can be described as: 1 mark
(a) A company specific network using company designed tools
(b) A local internet that is isolated from the Internet
(c) A faster version of the Internet
(d) A totally incompatible system to the Internet
5) In providing security for information, there is the requirement for both: 1 mark
(a) Logical and abstract resources
(b) Physical and abstract resources
(c) Passive and abstract resources
(d) Active and abstract resources
6) A cryptosystem converts plaintext into: 1 mark
(a) Cryptotext
(b) Silvertext
(c) Ciphertext
(d) None of the above
REPUBLIC OF CAMEROON
Peace Work Fatherland
***********
THE UNIVERSITY OF BAMENDA
***********
HIGHER TECHNICAL TEACHER TRAINING
COLLEGE (H.T.T.T.C.) BAMBILI
***********
DIRECTORATE OF STUDIES
**********
P.O.BOX 39 BAMBILI
REPUBLIQUE DU CAMEROON
Paix Travail - Patrie
***********
UNIVERSITE DE BAMENDA
***********
ECOLE NORMALE SUPERIEURE
D’ENSEIGNEMENT TECHNIQUE
***********
DIRECTION DES ETUDES
**********
Tél: 33 05 10 69
www.schoolfaqs.net
Page 2 of 2
7) Which of the following is a classic private-key system? 1 mark
(a) IDE
(b) IDA
(c) IDEA
(d) RSA
8) Computer security involves implementing measures: 1 mark
(a) To secure a single computer
(b) To secure several computers
(c) To secure several networks
(d) To secure a single network
9) Which TCP/IP application would be blocked if port 80 was blocked? 1 mark
(a) TELNET
(b) WWW (HTTP)
(c) FTP
(d) Electronic Mail (SMTP
10) The security within an Internet is difficult as a result of the fact that: 1 mark
(a) The Internet is a relatively new technology which is just emerging
(b) The Internet can be deployed to share numerous resources
(c) It embodies understanding when and how participating users, computers, services and networks can trust each other as well
understanding the technical details of network hardware and protocols
(d) The Internet grants unrestricted access to everyone who wants to use it
11) Please describe what access control is and why it is essential to organisations 6 marks
12) What is a worm? Explain how worms are used to infect networks and the devices that are connected to that network. 5 marks
13) Passwords are generally an important aspect of any secure network but they are only as good as the users conform to certain basic
guidelines or good rules. Please state any five of these good rules plus give brief explanations as to why each of them is crucial. 5
marks
14) Please discuss the concept of data encryption. 6 marks
15) Explain the concept of Denial of Service attacks plus state the implication that this has on the affected systems. 10 marks
16) Packet filters and application level gateways are exposed to insecurity vulnerabilities which can allow non-friendly users into the
network who could gain access to unauthorised information. Explain how this is possible plus give the best method of protection that
can be used to protect the data leaving from this network. Please also provide reasons for choosing this method. 6 marks
17) Please explain the term vulnerability within the context of computer/network security. 7 marks
18) Please differentiate between a private-key and a public-key plus state which of them is more suited/feasible for both large-scale
networks such as Internet/e-commence (secured) and why? 5 marks
19) Name any five hacking methods that are used by a hacker to break into a system. 5 marks
20) Please explain how security was being provided in the early days of computing and state why this has changed considerably today
plus what has brought about this change. 5 marks
www.schoolfaqs.net