Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

(Cisy 433) (Bbit 447): Cryptopraphy And Network Question Paper

(Cisy 433) (Bbit 447): Cryptopraphy And Network 

Course:Computer Science & Business Information

Institution: Kenya Methodist University question papers

Exam Year:2013



KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2013 (FT) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS INFORMATION
UNIT CODE : CISY 433/BBIT 447
UNIT TITLE : CRYPTOPRAPHY AND NETWORK
TIME : 2 HOURS


INSTRUSTIONS: Answer all question in section A and two in section B.
Section A: Answer all questions.
Question One
Define the following terms.
(6mks)
Origin non-repudiation
Digital signature
Authentication
List two instant messaging security threats.
(2mks)
Describe three cryptographic scheme SKC, PKC, and Hash functions.
(6mks)
Describe S/MIME certificate processing.
(4mks)
Describe whilepool logic.
(4mks)
Describe the penetration testing as applied in system securing. (4mks)
With examples show that KA=KB, using diffie-hellman Algorithm. (4mks)
Section B: Answer two questions in this section
Question Two
Describe four main RFID security challenges and basic RFID protection mechanism.
(5mks)
Discuss five evidence roles of network forensic.
(5mks)
Describe SET requirements, features and with the help of a diagram show all the set system participants.
(5mks)
Question Three
Describe the phases of penetration testing and various types of penetration testing.
(6mks)
Describe clearly the basic steps to create a RSA public private key. (6mks)
Show the formula for DES cryptographic algorithm and list the 16 round of permutation with a diagram.
(8mks)
Question Four
With one diagram show the message authenticaition code for Authentication and confidentiality and digital signature.
(5mks)
Briefly describe Kerbero Authentication and certificates.
(10mks)
With a diagram, describe two designs of firewalls.
(5mks)






More Question Papers


Popular Exams



Return to Question Papers