SECTION A
1. Which of the following describe the network security?
a. Network security is network that being created, stored, processed and
communicated using computers and networks.
b. Network security involves all activities that organizations, enterprises,
and institutions undertake to protect the value and ongoing usability
of assets and the integrity and continuity of operations.
c. Network security is used every day to conduct transactions and
communications among businesses, government agencies and
individuals.
d. Network security is used every day to protect the network.
2. Which of the following best describe the confidentiality based on
information security services?
a. Maintaining the privacy of data
b. Establishing proof of identity
c. Ability to prove that the sender actually sent the data
d. Computer assets are available to authorized parties when needed
3. Which of the following best describe the Non-repudiation based on
information security services?
a. Maintaining the privacy of data
b. Establishing proof of identity
c. Ability to prove that the sender actually sent the data
d. Computer assets are available to authorized parties when needed
4. Which of the following best describe the Authentication based on
information security services?
a. Maintaining the privacy of data
b. Establishing proof of identity
c. Ability to prove that the sender actually sent the data
d. Computer assets are available to authorized parties when needed
5. Which of the following best describe the Availability based on
information security services?
a. Maintaining the privacy of data
b. Establishing proof of identity
c. Ability to prove that the sender actually sent the data
d. Computer assets are available to authorized parties when needed
6. Which of the following is NOT the cause of the successful attack of a
hackers?
a. Lack of basic password security
b. Lack of updating computer system of application
c. Lack of client or computer users awareness
d. Lack of basic firewall port blocking
7. Which of the following is the security goals?
i. Confidentiality
ii. Integrity
iii. Authentication
iv. Availability
a. i,ii,iii
b. i,iii,iv
c. i,ii,iv
d. ii,iii,iv
8. Which of the following is NOT the security method?
a. Data communication
b. Administrative
c. Logon
d. Identification
9. Which of the security method best describe the statement ”The most
common form of security identification that is, verification of who a user
is and that the user is permitted to use the network”
a. Data communication
b. Administrative
c. Logon
d. Identification
10. Which of the following is NOT the internet services?
a. File sharing
b. File transfer
c. Remote Access to Host
d. Real time conferencing services
11. Which of the following know as security threat?
i. Data modification
ii. Hacking
iii. Cracking
iv. Spoofing
a. i,ii and iii
b. i,iii, and iv
c. ii, iii, and iv
d. i, ii, iii, and iv
12. Statement “Activities to breaks into someone else's computer system,
bypasses passwords or licenses in computer programs” refer to which
security threat?
a. Spoofing
b. Cracking
c. Sniffing
d. Hacking
13. Which of the following is NOT kind of threat in the network?
a. Sniffing
b. Interruption
c. Interception
d. Fabrication
14. Which of the following is the example of attack in the security enviroment?
i. Reconnaissance attack
ii. Denial of service attack
iii. Distributed denial of service attack
iv. Data disclosure attack
a. i, ii, iii
b. i, iii, iv
c. i, ii, iv
d. ii, iii, iv
15. The following is the identify of the threat in the security environment
EXCEPT...
a. Extensible threat
b. Unstructured threats
c. Structured threats
d. External threats
16. Statement “Someone who just like to know exactly how things work. They
don’t cause harm, but rather explore, experiment and gain knowledge”
best describe
a. Cracker
b. Attacker
c. Jumper
d. Hacker
17. Statement “attacker disables or corrupts networks, systems, or services
with the intent to deny the service to intended users and crashing the
system or slowing it down to the point where it is unusable “ is best
describe
a. Reconnaissance attacks
b. Access attacks
c. Denial of Services (DoS) attacks
d. Instrusion Prevention System (IPS) attacks
18. Malicious code attack mostly hides in the following application EXCEPT
a. Email
b. File transfer
c. Web content
d. Legitimate sites
19. The statement “It also passing the infection from one infected system to
another” best describe
a. Worm
b. Trojan
c. Horses
d. Virus
20. The statement” Flood of packet are sent to a server requesting client
connection. The packet contain invalid IP address” best describe
a. Ping of death
b. SYN Flooding
c. Data modification
d. Data disclosure
21. Statement “Hardware or software tool used to protect a single host or an
entire network. It functions to allow or deny access to incoming and
outgoing traffic” best describe
a. Firewall
b. Worm
c. Antivirus
d. Operating system patches
22. Which of the following is NOT the function of firewall
a. Separate public and private network
b. Prevent unwanted traffic
c. Monitoring system
d. Dial up modem
23. Which of following is NOT types of firewalls architecture
a. Dial-up Architecture
b. Artificial Architecture
c. Single Router Architecture
d. Firewall with Proxy Server
24. Which of following is types of firewall technologies
i. Static Packet Filtering
ii. Dynamic Packet Filtering
iii. Proxy
iv. Server Packet Filtering
a. i,ii, iv
b. i, iii, iv
c. ii, iii, iv
d. i, ii, iii
25. Which of the firewall are NOT examines each packet based on the
following criteria in the Static Packet Filtering
a. Source IP address
b. Source MAC address
c. Destination IP address
d. Destination service port
26. Viruses can infected through three (3) way EXCEPT
a. Backup disk
b. Internet
c. networked computers
d. removable disks
27. Which of the following example below viruses CANNOT infected
a. Shared network drive
b. Floppy disk
c. Paper documentation
d. Removal disk drive
28. Which of the following consist at least 2 interface in a firewall
i. Source IP Address
ii. Destination IP Address
iii. Public network
iv. Private network
a. i, ii
b. ii, iii
c. iii, iv
d. i, iv
29. What is the disadvantage of using single firewall configuration
a. ISP network is separated from other networks – limiting the intrusion
b. Implemented easily in an existing architecture
c. An intruder who gains access to a server in the ISP network may gain
access to other servers on the site
d. One firewall to purchase and manage
30. Which of the following is the system policy that an administrator should
NOT follow in the Windows Security Approach?
a. Password
b. Account
c. Audit
d. Monitor
31. Hot fixes and service pack are
a. Application
b. Patches
c. Software
d. Virus
e. Games
32. Which of the following is NOT the basic level of security in the computer
environment?
a. Sharing password
b. Secure your wireless network
c. Secure your backup tapes
d. Disable the Guest Account
33. What is the function of the Internet Protocol Security (IPSec) Filtering?
a. Used to help protect computers from network-based attacks from
threats such as viruses and worms.
b. Allow users to perform tasks on a computer
c. Privileges control access to computer and domain resources
d. Use a firewall if you have a full time internet connection
34. Which of the following is NOT vulnerabilities of Internet Information
Services
a. Large number of open ports
b. Default installs of operating system and applications
c. ISAPI Extension Buffer Overflows
d. Secure your wireless network
35. Which of the following is NOT the main features of Microsoft Security
Server ?
a. Network connectivity
b. Proxy connectivity
c. Server connectivity
d. Proxy security
36. What does authentication means in the network security enviroment?
a. process of proving one’s identity to someone else
b. Determine the level of access, or services to which user has access
c. monitoring what user do while logged in
d. allow user access without password for quick use
37. What does authorization means in the network security enviroment?
a. process of proving one’s identity to someone else
b. Determine the level of access, or services to which user has access
c. monitoring what user do while logged in
d. allow user access without password for quick use
38. What does accounting means in the network security enviroment?
a. process of proving one’s identity to someone else
b. Determine the level of access, or services to which user has access
c. monitoring what user do while logged in
d. allow user access without password for quick use
39. Which of the following is NOT the attack that can be launch if
authentication is not be implemented?
a. Eavesdropper attacks
b. Replay attacks
c. Duplicated file attack
d. Phishing attacks
40. Statement “Operations performed in converting encrypted messages to
plain text without initial knowledge of the crypto-algorithm and/or key
employed in the encryption” best refer to
a. Decryption
b. Encryption
c. Cipher Text
d. Cryptanalysis
41. Which of the following is the two classes of key-based encryption
algorithms
i. Symmetric
ii. Asymmetric
iii. Encryption
iv. Decryption
a. i,ii
b. i,iii
c. iii,iv
d. ii, iv
42. The following is the example of the symmetric( secret key) except
a. DES
b. IDEA
c. TWOFISH
d. ELGAMAL
43. Statement “Exchange of tokens that hide the implementation detail from
the higher level application and wrapping include confidentiality (secrecy)
and integrity (authenticity)” refer to
a. DNSSEC
b. GSSAPI
c. SSL
d. SHTTP
44. Which of the following is the application of VPN
i. Firewall based VPN
ii. Server based VPN
iii. Router based VPN
iv. Dedicated software or hardware
a. i,ii, iii
b. i, iii, iv
c. i, ii, iv
d. ii, iii, iv
45. Which of the types of backup that copy all the data in the hard disk
a. Full backup
b. Differential backup
c. Incremental backup
d. Imaging backup
46. Which of the types of backup that copy all the data that been choose by user to a
certain folder
a. Full backup
b. Differential backup
c. Incremental backup
d. Imaging backup
47. Which of the types of backup that copy all the folder in the storage that been choose
e. Full backup
f. Differential backup
g. Incremental backup
h. Imaging backup
48. Which of the following is not the hardware use for handling server disaster
a. UPS
b. RAID
c. VERITAS EXEC Backup
d. REDUNDANT Server
49. Which of the following is the advantage of using RAID in handling server
disaster
a. Organizing disks into a redundant array decreases the usable storage
capacity
b. Data may be overwritten by a system malfunction
c. A file may be damaged or deleted by user error and not noticed for
days or weeks
d. The entire array is at risk of physical damage
50. Which of the following is NOT the categorization of cluster in handling
server disaster
a. High-availability (HA) clusters
b. Load-balancing clusters
c. Grid computing
d. Backup cluster
SECTION B
CHOOSE TWO FROM FOUR QUESTION BELOW
1. a. Define network security (2
Marks)
- Network security involves all activities that organizations,
enterprises, and institutions undertake to protect the value
and ongoing usability of assets and the integrity and
continuity of operations.
b. Explain four type of internet services that can be found in the
network environment
(8 Mark)
i. electronic mail and news :
- WAYS FOR PEOPLE TO EXCHANGE INFORMATION WITHOUT
INQUIRING AN IMMEDIATE,INTERACTIVE RESPONSE
ii. file transfer :
- TRANSMITTING FILE OVER A COMPUTER NETWORK OR THE
INTERNET
- THE SIMPLEST WAY TO EXCHANGE FILES BETWEEN
COMPUTERS ON THE INTERNET
iii. remote access to host :
- THE ABILITY TO LOG ONTO A NETWORK IN DISTANT LOCATION
eg:telnet
iv. real time conferencing service :
- DESIGNED FOR INTERACTIVE USE BY ON-LINE PARTICIPANTS
c. Explain the security threat that can be found in the network
environment
(15
Marks)
i. data modification :
- ADALAH SATU USAHA UNTUK MENUKAR
MAKLUMAT OLEH SEORANG ATTACKER TANPA
SEBARANG KEBENARAN UNTUK MENGUBAHSUAI
ii. Hacking :
- PENGUBAHSUAIAN HARDWARE ATAU SOFTWARE
TANPA SEBARANG KEBENARAN UNTUK
MENCAPAI MATLAMAT DI LUAR TUJUAN ASAL
PEMBUATNYA.
- DILAKUKAN TANPA MENDAPAT SEBARANG
KEBENARAN SAH UNTUK SEBUAH KOMPUTER
MAHUPUN RANGKAIAN.
- ORANG-ORANG YANG TERLIBAT DALAM
KEGIATAN HACKING DIKENALI SEBAGAI HACKERS
iii. Cracking :
- MEMECAH MASUK KE DALAM SESEBUAH SISTEM
KOMPUTER ORANG LAIN DENGAN CARA BYPASS
PASSWORD DAN LESEN DALAM PROGRAM
KOMPUTER
- BERTUJUAN UNTUK MENGAUT
KEUNTUNGAN,BERNIAT JAHAT,MEMPUNYAI
TUJUAN TERTENTU ATAU KERANA TERDAPAT
CABARAN.
iv. Spoofing :
- KAEDAH SERANGAN PROGRAM KOMPUTER DI
MANA SESEBUAH PROGRAM TELAH DIUBAHSUAI
TANPA PENGETAHUAN TETAPI TETAP
DIJALANKAN SECARA BIASA, TETAPI PADA
REALITINYA IANYA TELAH DIUBAH SUAI DENGAN
TUJUAN UNTUK MENGELAKKAN MEKANISMA
KESELAMATAN.
v. Sniffing :
- SNIFFER PROGRAM MENGAWAL LALU LINTAS
DALAM RANGKAIAN
- DILAKUKAN UNTUK TUJUAN SAH SEPERTI
PENTADBIR DATA RANGKAIAN TETAPI
MELAKUKAN KERJA TIDAK SAH SEPERTI MENCURI
MAKLUMAT RANGKAIAN
- BERTUJUAN UNTUK MENCURI PASSWORD,EMAIL
TEXT DAN FILE TRANSFER
- MENYULITKAN LALULINTAS YANG MENGANDUNGI
MAKLUMAT SULIT
- MENGGUNAKAN SESEBUAH PERISIAN UNTUK
MENCARI KEDUDUKAN SNIFFER DALAM
RANGKAIAN
2. a. Differentiate between attackers and hackers (6
Marks)
ATTACKERS HACKERS
-SESEORNG YANG INGIN MENCURI --SESEORANG YANG MEMECAH MASUK
ATAU MENGGANGGU ASET ORANG KE DALAM KOMPUTER ATAU
LAIN KESELAMATAN RANGKAIAN
-MEMPUNYAI KEMAHIRAN -MEMPUNYAI PEMAHAMAN YANG
TEKNIKAL MENDALAM TENTANG KOMPUTER DAN
RANGKAIAN
-MENYERANG KOMPUTER UNTUK -TIDAK MELAKUKAN SEBARANG
MENYEBABKAN KEROSAKAN ATAU KEROSAKAN TETEPI LEBIH KEPADA
KESULITAN EKSPLORASI,EKSPERIMEN DAN
MENAMBAH PENGETAHUAN
b. Explain the attack example in the network system below
I. reconnaissance attack :
- JUGA DISEBUT SEBAGAI MENGUMPUL MAKLUMAT
- IANYA MENDAHULUI SERANGAN DoS
- INTRUDERS BIASANYA MELAKUKAN PING-
SWEEPS PADA SASARAN RANGKAIAN UNTUK
MENENTUKAN ALAMAT IP YANG AKTIF
II. access attack
- MERUJUK PADA MUAT TURUN DAN AKSES SISTEM
SECARA TIDAK SAH
- MUAT TURUN DATA TIDAK SAH SEPERTI
MEMBACA, MENULIS, MENYALIN ATAU
MEMINDAHKAN GAMBAR-GAMBAR YANG TIDAK
DIJANGKA AKAN DIAKSES OLEH INTRUDER
- AKSES SISTEM MERUPAKAN KEMAMPUAN
INTRUDER UNTUK MENGAKSES KEPADA ENJIN
TAMPA SEBARANG AKAUN ATAU PASSWORD
III. denial of service attack :
- PENYERANG AKAN MEROSAKKAN RANGKAIAN,
SISTEM ATAU PERKHIDMATAN DENGAN TUJUAN
UNTUK MENOLAK PERKHIDMATAN KEPADA
PENGGUNA YANG SAH
- MELLAMBATKAN SISTEM SEHINGGA IANYA TIDAK
BOLEH DIGUNAKAN
- BERUSAHA UNTUK MEMBANJIRI RANGKAIAN
SEHINGGA MENCEGAH LALULINTAS YANG SAH
IV. malicious code attack :
- MERUPAKAN APLIKASI AUTO-EXECUTEABLE
- SEJENIS ANCAMAN BARU YANG TIDAK DAPAT
DIHALANG OLEH ANTI-VIRUS SENDIRIAN
- BOLEH MENGAMBIL BENTUK KAWALAN ActiveX,
PLUG-IN,SCRIPT BAHASA UNTUK SEJUMLAH
ATURCARA BARU YANG DIREKA UNTUK
MENINGKATKAN LAMAN WEB DAN EMEL.
- SERANGAN PENOLAKAN PERKHIDMATAN
(12
Marks)
c. differentiate between worm, viruses and trojan horses
( 7 Marks)
WORM VIRUSES TROJAN HORSE
MEMPUNYAI MAMPU UNTUK MENYALIN TIDAK MAMPU MENGULANGI
KEBOLEHAN UNTUK DIRI SENDIRI DAN DIRI SENDIRI SEPERTI WORM
MENGULANGI DIRI MEMBIAK
SENDIRI DAN
MENIMBULKAN KESAN
NEGATIF
TIDAK PERLU MENJANGKITI DARIPADA TIDAK MEREBAK DENGAN
MENJANGKITI FAIL LAIN SATU SISTEM KEPADA MENJANGKITI FAIL-FAIL LAIN
UNTUK MEMBIAK SISTEM YANG LAIN
CONTOH : MORRIS CONTOH : BRAIN VIRUS CONTOH : BEAST
WORM
3. a. Explain the server based security componenets below
i. personal firewall
ii. anti-virus software
iii. operating system patches
iv. device hardening
(12
Marks)
b. differentiate between static packet filtering , dynamic packet
filtering, and proxy
(9 Marks)
c. explain the denial of service attack below
I. SYN Flooding
II. Ping of death
(4 Marks)
4. a. Explain the attacks that can be launched if authentication is not
implemented
(15
Marks)
b. Explain the standard and protocol below
I. DNSSEC
II. GSSAPI
(6
Marks)
c. Brief the different between modem pool replacement and dedicated WAN Link
Replacement
(4 Marks)