Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Decm 033:Information And Communication Security Question Paper

Decm 033:Information And Communication Security 

Course:Business Administration

Institution: Kenya Methodist University question papers

Exam Year:2010



INSTRUCTIONS Answer Question ONE and any Other TWO Questions


Question 1

a) Explain briefly criminal activities that may be directed to a computer processor? (5marks)

b) How would a computer memory be useful to a computer forensic expert? (5marks)

c) What is a key stroke logger and how is it used by criminals in computer systems (7marks)

d) Discuss various modes that can be used to destroy Hard Disks in high security environments? (8marks)


Question 2

a) Explain what we mean by automated attacks in computer systems. (5marks)

b) Discuss why internal attacks are more dangerous in regard to computer systems(15marks)


Question 3

a) Explain the term bits and bytes (6marks)

b) Signal interference is a potential avenues for data theft or destruction in a computer network. Discuss how network signal can be interfered with by criminal (14marks)


Question 4

a) Explain the term metropolitan area network. (5marks)

b) Why does network typology/layout matter to computer forensic investigator. Discuss

(12marks)


Question 5

a) Melisa has been common virus in networks. Describe briefly its characteristics. (6marks)

b) Compare and contrast the worm Nimda worm and the virus Melisa. (12marks)


Question 6

a) Explain the term network lacking (5marks)

b) Many network hackers bring down networks system by exploiting Transmission control protocol or internet protocol (12marks)






More Question Papers


Popular Exams



Return to Question Papers