Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Information Systems Security Question Paper

Information Systems Security 

Course:Bachelor Of Computer Science

Institution: Masinde Muliro University Of Science And Technology question papers

Exam Year:2009



MASINDE MULIRO UNIVERSITY OF SCIENCE AND TECHNOLOGY
UNIVERSITY EXAMINATIONS
2008/2009 ACADEMIC YEAR
THIRD YEAR SECOND SEMESTER EXAMINATIONS
FOR THE DEGREE OF BACHELOR OF SCIENCE (COMPUTER SCIENCE)
COURSE CODE: COM 323E
COURSE TITLE: INFORMATION SYSTEMS SECURITY
DATE: 27th April 2009 TIME: 2.00 p.m. – 5.00 p.m.
INSTRUCTIONS TO CANDIDATES
Answer QUESTION ONE and ANY OTHER TWO.
Time allowed: 3hrs

Question One
a. Give the idea of the principle of easiest Penetration. 2 marks
b. What is a port scan used for? 2 marks
c. Explain about the boot sector viruses. 3 marks
d. Explain five basic requirements for database security. 5 marks
e. Give three of Shannon’s characteristic of “Good”ciphers. 3 marks
f. Differentiate between hactivism and cyberterrorism. 4 marks

i. What is a web bug? 2 marks
ii. Give any other terms that could be used to refer to it. 1 marks
h. Threats can be viewed as being one of four kinds: interception, interruption,
modification, and fabrication. Explain the four terms and give examples thereof.
i) Interception 2 marks
ii. Interruption 2 marks
iii. Modification 2 marks
iv. Fabrication 2 marks

Question Two
a. Differentiate between encoding and enciphering. 4 marks
b. Compare secret key and public key encryption using five criteria. 8 marks
c. Differentiate between a cryptographer and crypto analyst. 4 marks
d. Give the properties of “trustworthy”encryption system. 4 marks

Question Three
a. Differentiate between the terminologies “fault”and “failure”as used in program
security. 3 marks
b. Define the term buffer overflow giving an example. 4 marks
c. The virus writer looks at some of the qualities appealing in a virus. List four of
these qualities. 4 marks
d. Explain about virus signatures. 2 marks
e. State the truths and misconceptions about viruses. 7 marks

Question Four
a. Define the term precision. 2 marks
b. Explain database concerns about reliability and integrity using three dimensions.
6 marks
c. Define the term sensitive data. 2 marks
d. Explain the factors that make data sensitive giving examples. 10 marks

Question Five
a. What makes a network vulnerable? Explain. 9 marks
b. What is a firewall? 2 marks
c. Explain the types of firewalls. 5 marks
d. Using a diagram state the common components of an intrusion Detection
Framework. 4 marks






More Question Papers


Popular Exams



Return to Question Papers