BAC2316  CYBER SECURITY.

UNIVERSITY EXAMINATIONS: 2018/2019
EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN
APPLIED COMPUTING
BAC2316 CYBER SECURITY
FULL TIME/PARTTIME
DATE: APRIL 2019 TIME: 2 HOURS
INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions.

QUESTION ONE: [30 MARKS]
a) Using examples, explain the following:
(i) Confidentiality [2 Marks]
(ii) Integrity [2 Marks]
(iii) Availability [2 Marks]
(iv) Encryption [2 Marks]
(iv) Digital Certificates [2 Marks]
b) List any four indicators of successful risk management in an IT organization. [4 Marks]
c) Describe the Cyber Security counter measure technologies. [4Marks]
d) What is the importance of each one of the following policies in an organization?
[3 Marks]
(i) Acceptable Use Policy
(ii) Disposal and destruction policy
e) Define the 3 types of hackers [6Marks]
f) Describe Social Engineering. [3Marks]
QUESTION TWO [20 MARKS]
a) Describe the different types of malware. [5 Marks]
b) Describe the different types of Wireless and mobile attacks. (10 Marks)
c) Explain how you would guard against wireless and mobile attacks. (5 Marks)
QUESTION THREE [20 MARKS]
a) Differentiate between the two types of encryption algorithms:
i) Symmetric encryption
ii) Asymmetric encryption [4 Marks]
b) Explain what a VPN is and describe how it works [6 Marks]
c) Describe the types of security controls in relation to access control. [5Marks]
d) Explain Steganography and Data Obfuscation. [5Marks]
QUESTION FOUR [20 MARKS]
a) Using examples describe the hashing algorithm [5Marks]
b) Describe the different types of email and browser attacks. [10 Marks]
c) Explain ways to guarantee physical access control [5Marks]
QUESTION FIVE [20 MARKS]
a) Explain the Five Nines [3Marks]
b) Define the environments that require the Five Nines [5Marks]
c) Describe Business Continuity Planning and its best practices. [10Marks]
d) What is asset management? [2Marks]

(Visited 108 times, 1 visits today)
Share this:

Written by