Professional Documents
Culture Documents
Bahagian B: 70 Markah
Bahagian B: 70 Markah
SECTION B: 70 MARKS
BAHAGIAN B: 70 MARKAH
INSTRUCTION:
This section consists of TWO (2) structured questions and TWO (2) essay questions.
Answer ALL questions in the answer booklet.
ARAHAN:
Bahagian ini mengandungi DUA (2) soalan berstruktur dan DUA (2) soalan esei.
Jawab semua soalan di dalam buku jawapan yang disediakan.
QUESTION 1
SOALAN 1
CLO1-C2 b) State TWO (2) tasks done by a virus when infecting a computer.
Nyatakan DUA (2) tugas yang dilaksanakan oleh virus apabila menjangkiti
komputer.
[2 marks]
[2 markah]
CLO1- C3 c) Student reported that when he scanned his computer by using Trend Micro
Antivirus, the following alerts appeared. Based on the scenario, what type of
attack has been experienced by this student?
1. W32.Mydoom.AX@mm
2. Troj/Invo-Zip
Figure B1 / Rajah B1
[2 marks]
[2 markah]
12 SULIT
SULIT FN612: NETWORK SECURITY
CLO2- C2 f) Firewalls are not a complete solution to all computer security problems.
Identify TWO (2) functions that firewall cannot block?
[2 marks]
[2 markah]
h) Argue the myth regarding password such as J0hn Sm1th that also result in
CLO2- C1
users creating a weak password.
Hujahkan mitos mengenai kata laluan seperti J0hn Sm1th yang juga
menyebabkan pengguna mencipta kata laluan yang lemah.
[2 marks]
[2 markah]
13 SULIT
SULIT FN612: NETWORK SECURITY
QUESTION 2
SOALAN 2
i. Information Theft
Kecurian Maklumat
[2 marks]
[2 markah]
CLO3-C2 d) Based on figure below, identify each of the process that occur in (i) and (ii).
Berdasarkan gambarajah di bawah, tentukan setiap proses yang berlaku di
dalam (i) dan (ii).
14 SULIT
SULIT FN612: NETWORK SECURITY
e) Encrypt the message in Figure 2(a) by using the Caeser Cipher algorithm
CLO3-C2 (key=2).
Enkrip maklumat dalam Rajah 2(a) menggunakan Caeser Cipher algorithm
(key=2).
I Love Network
Figure B3 / Rajah B3
[2 marks]
[2 markah]
[4 marks]
[4 markah]
CLO3-C3 g) How do you safely exchange symmetric keys with people all over the world
using the same medium (the Internet) which is insecure for encryption in the
first place? Bagaimana anda secara selamat bertukar kekunci simetri dengan
orang di seluruh dunia menggunakan medium yang sama (Internet) dimana
pada awalnya ia tidak selamat bagi enkripsi.
[2 marks]
[2 markah]
[2 marks]
[2 markah]
15 SULIT
SULIT FN612: NETWORK SECURITY
QUESTION 3
SOALAN 3
a) Explain the necessary approach needed for organization that want to ensure
CLO1-C3 network
security goals such as their service and information accessible.
[3 marks]
[3 markah]
CLO2-C2 e) Explain the meaning of open port, closed port and blocked port when attacker
try to scan your application.
Jelaskan maksud ‘port’ terbuka, tertutup dan disekat apabila penggodam cuba
mengimbas aplikasi anda.
[3 marks]
[3 markah]
16 SULIT
SULIT FN612: NETWORK SECURITY
[3 marks]
[3 markah]
17 SULIT
SULIT FN612: NETWORK SECURITY
QUESTION 4
SOALAN 4
CLO2-C2 b) Identify security enhancement for Internet Information Services (IIS) (depends
on version released).
Kenalpasti peningkatan keselamatan bagi IIS (bergantung kepada versi yang
dikeluarkan).
[3 marks]
[3 markah]
END OF QUESTION
SOALAN TAMAT
18 SULIT