Professional Documents
Culture Documents
Bahagian B: 55 Markah
Bahagian B: 55 Markah
SECTION B: 55 MARKS
BAHAGIAN B: 55 MARKAH
INSTRUCTION:
This section consists of TWO (2) structured questions. Answer ALL questions.
ARAHAN:
Bahagian ini mengandungi DUA (2) soalan berstruktur. Jawab semua soalan.
QUESTION 1
SOALAN 1
(b) Interpret ONE (1) difference between Open Security Model and Closed Security
CLO1
C3 Model.
Takrifkan SATU (1) perbezaan di antara ‘Open Security Model’ dan ‘Closed
Security Model’.
[2 Marks]
[2 Markah]
17 SULIT
SULIT DFN6223: NETWORK SECURITY
CLO1 (d) Describe the following types of threats with suitable example.
C2 Huraikan jenis-jenis ancaman di bawah dengan contoh yang bersesuaian.
i. External threats
ii. Internal threats
[5 Marks]
[5 Markah]
CLO1 (f) Differentiate between Network Level Firewall and Application Level Firewall.
C4 Bezakan di antara Network Level Firewall dan Application Level Firewall
[5 Marks]
[5 Markah]
CLO2 (g) List TWO (2) common technologies employed in building firewalls.
C1
Senaraikan DUA (2) teknologi yang biasanya digunakan semasa membangunkan
firewall.
[2 Marks]
[2 Markah]
CLO2 (h) Explain either one of the technologies employed in building firewalls.
C2 Terangkan salah satu teknologi tersebut dalam membina Firewall.
[2 Marks]
[2 Markah]
18 SULIT
SULIT DFN6223: NETWORK SECURITY
QUESTION 2
SOALAN 2
CLO2 (a) Describe FIVE (5) basic security levels for Microsoft Windows.
C2 Huraikan LIMA (5) tahap keselamatan untuk Microsoft Windows.
[5Marks]
[5 Markah]
CLO2 (b) Microsoft windows generate a system policy to secure the user requirements.
C3 Microsoft windows menjana sistem polisi untuk menjamin keperluan pengguna.
i. In Microsoft Windows, user can perform several System Policies to manage
their security approaches. Relate TWO (2) of the System policies that can
be applied. Give examples to support the explanation.
ii. Demonstrate TWO (2) examples of strong passwords that can be used by
users.
Demonstrasikan DUA (2) contoh kata laluan yang paling selamat bagi
kegunaan pengguna.
[2Marks]
[2 Markah]
CLO3 (c) Define about the authentication process in relation to network security.
C1 Definisikan proses pengesahan yang berkaitan dengan keselamatan rangkaian.
[2 marks]
[2 markah]
19 SULIT
SULIT DFN6223: NETWORK SECURITY
CLO3 (e) Encryption is a process to encode message from the original plain text to another
C3 form which cannot be easily understood by unauthorized parties.
Enkripsi adalah proses di mana berlakunya perubahan teks biasa kepada bentuk
yang tidak difahami oleh pihak luar.
ii. Demonstrate the decryption output for this statement by using the Caesar Cipher
techniques, with the key = 8.
Demonstrasikan output deskripsi untuk pernyataan di bawah dengan
menggunakan teknik Caesar Cipher, dengan kekunci = 8.
AFXGJESLAGFKWUMJALQ
[3 Marks]
[3 Markah]
CLO3 (g) Interpret the key concept of the Redundant Array of Independent Disk (RAID)
C3 technology.
Taksirkan konsep utama teknologi ‘Redundant Array of Independent Disk (RAID).
[2 Marks]
SOALAN TAMAT [2 Markah]
20 SULIT