Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

SULIT DFN6223: NETWORK SECURITY

SECTION B: 55 MARKS
BAHAGIAN B: 55 MARKAH

INSTRUCTION:
This section consists of TWO (2) structured questions. Answer ALL questions.

ARAHAN:
Bahagian ini mengandungi DUA (2) soalan berstruktur. Jawab semua soalan.

QUESTION 1
SOALAN 1

CLO1 (a) i. Define the network security term.


C1
Definisikan istilah keselamatan rangkaian.
[3 Marks]
[3 markah]

ii. Define the concept of security policy.


Definisikan konsep polisi keselamatan.
[2 Marks]
[2 Markah]

(b) Interpret ONE (1) difference between Open Security Model and Closed Security
CLO1
C3 Model.
Takrifkan SATU (1) perbezaan di antara ‘Open Security Model’ dan ‘Closed
Security Model’.
[2 Marks]
[2 Markah]

17 SULIT
SULIT DFN6223: NETWORK SECURITY

CLO1 (c) Give a definition for security threats.


C1 Berikan definisi bagi ancaman keselamatan.
[2 Marks]
[2 Markah]

CLO1 (d) Describe the following types of threats with suitable example.
C2 Huraikan jenis-jenis ancaman di bawah dengan contoh yang bersesuaian.
i. External threats
ii. Internal threats
[5 Marks]
[5 Markah]

CLO1 (e) Explain Device Hardening process with suitable example.


C2 Terangkan proses Device Hardening dengan memberikan contoh yang bersesuaian.
[2 Marks]
[2 Markah]

CLO1 (f) Differentiate between Network Level Firewall and Application Level Firewall.
C4 Bezakan di antara Network Level Firewall dan Application Level Firewall
[5 Marks]
[5 Markah]

CLO2 (g) List TWO (2) common technologies employed in building firewalls.
C1
Senaraikan DUA (2) teknologi yang biasanya digunakan semasa membangunkan
firewall.
[2 Marks]
[2 Markah]

CLO2 (h) Explain either one of the technologies employed in building firewalls.
C2 Terangkan salah satu teknologi tersebut dalam membina Firewall.
[2 Marks]
[2 Markah]

18 SULIT
SULIT DFN6223: NETWORK SECURITY

QUESTION 2
SOALAN 2

CLO2 (a) Describe FIVE (5) basic security levels for Microsoft Windows.
C2 Huraikan LIMA (5) tahap keselamatan untuk Microsoft Windows.
[5Marks]
[5 Markah]

CLO2 (b) Microsoft windows generate a system policy to secure the user requirements.
C3 Microsoft windows menjana sistem polisi untuk menjamin keperluan pengguna.
i. In Microsoft Windows, user can perform several System Policies to manage
their security approaches. Relate TWO (2) of the System policies that can
be applied. Give examples to support the explanation.

Dalam Microsoft Windows, pengguna boleh melakukan beberapa polisi


Sistem untuk menguruskan pendekatan keselamatan mereka. Kaitkan DUA
(2) Polisi Sistem yang boleh digunakan. Berikan contoh untuk menyokong
penerangan anda.
[4Marks]
[4 Markah]

ii. Demonstrate TWO (2) examples of strong passwords that can be used by
users.
Demonstrasikan DUA (2) contoh kata laluan yang paling selamat bagi
kegunaan pengguna.
[2Marks]
[2 Markah]
CLO3 (c) Define about the authentication process in relation to network security.
C1 Definisikan proses pengesahan yang berkaitan dengan keselamatan rangkaian.

[2 marks]
[2 markah]

19 SULIT
SULIT DFN6223: NETWORK SECURITY

CLO3 (d) Discuss THREE (3) importance of the authentication process.


C2 Bincangkan TIGA (3) kepentingan proses pengesahan.
[6 Marks]
[6 Markah]

CLO3 (e) Encryption is a process to encode message from the original plain text to another
C3 form which cannot be easily understood by unauthorized parties.
Enkripsi adalah proses di mana berlakunya perubahan teks biasa kepada bentuk
yang tidak difahami oleh pihak luar.

i. Illustrate the process of Symmetric and Asymmetric encryption.


Gambarkan proses penyulitan Simetri dan Asimetri.
[4 Marks]
[4 Markah]

ii. Demonstrate the decryption output for this statement by using the Caesar Cipher
techniques, with the key = 8.
Demonstrasikan output deskripsi untuk pernyataan di bawah dengan
menggunakan teknik Caesar Cipher, dengan kekunci = 8.
AFXGJESLAGFKWUMJALQ
[3 Marks]
[3 Markah]

CLO3 (f) Explain the disadvantages of incremental backup.


C2 Terangkan kelemahan Sandaran Peningkatan.
[2 marks]
[2 markah]

CLO3 (g) Interpret the key concept of the Redundant Array of Independent Disk (RAID)
C3 technology.
Taksirkan konsep utama teknologi ‘Redundant Array of Independent Disk (RAID).

[2 Marks]
SOALAN TAMAT [2 Markah]

20 SULIT

You might also like