BAC 2316  CYBER SECURITY.

UNIVERSITY EXAMINATIONS: 2017/2018
EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN
APPLIED COMPUTING
BAC 2316 CYBER SECURITY
FULL TIME/PARTTIME
DATE: AUGUST, 2018 TIME: 2 HOURS
INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions.

QUESTION ONE
a) Differentiate between Cyber security from computer security. [2 Marks]
b) Explain the fundamental goals of Cyber security in protecting organization’s assets.
[6 Marks]
c) Explain importance of logs for internal controls in an organization. [4 Marks]
d) Outline the difference between vulnerabilities and threats. [2 Marks]
e) Explain any two types of Cyber security. [4 Marks]
f) Describe any three tools used by computer criminals. [6 Marks]
g) Explain the difference between a hacker and a cracker. [2 Marks]
h) Define the term meta data. [2 Marks]
QUESTION TWO
a) Explain how meta data helps in logs when auditing a system in an organization. [5 Marks]
b) Imagine you are the chief system security of ABC bank in Kenya. You wake up one morning
and find out that your systems have been hacked. As a Cyber security specialist, explain the
steps you will follow to solve the problem. [5 Marks]
c) Differentiate between prevention technique and detection techniques as used in Cyber
security. [4 Marks]
d) There is a patch for system but there is no patch for human weaknesses. Basing your
argument on this statement, answer the following questions.
i) What is the most appropriate hacking technique that a hacker likely to use to exploit the
vulnerabilities? [2 Marks]
ii) With appropriate examples, explain why human are more vulnerable than systems yet
system cannot even reason. [4 Marks]
QUESTION THREE
a) Windows operating system is one of the most targeted system in the world yet it is a
proprietary software. Using appropriate examples, briefly explain why this is so. [4 Marks]
b) Explain tools that have been implemented in windows operating system to prevent attacks
from malicious people. [4 Marks]
c) Kapara has a WEP wireless network but he cannot access it because malicious personnel
stole his password, changed it thus denying him access to his own network. As an ethical
hacker, explain the tools you will use to crack the network so that he can get the access
again. [6 Marks]
d) After a successful work, what advice will you give Kapara. [6 Marks]
QUESTION FOUR
a) Explain three detection tools used in Cyber security. [6 Marks]
b) Wireless network is more vulnerable to attacks than the wired networks. Explain why this
statement is true. [2 Marks]
c) Peter wants to determine vulnerabilities of the operating systems used in his organization.
Indicating the main function of each, explain the tools you will propose to him. [6 Marks]
d) Explain the deference between Trojan horses, viruses, spyware and worms. [6Marks]
QUESTION FIVE
a) Basing your argument on “when you want your system to be secure, you have to think like a
hacker”, explain how you will prevent your systems from vulnerabilities. [4 Marks]
b) Differentiate between Cybercrime and traditional crime. [2 Marks]
c) Why is Cyber security still an issue even today. [4 Marks]
d) Discuss how computer is used as a Cyber crime tool. [10 Marks]

(Visited 101 times, 1 visits today)
Share this:

Written by