You are on page 1of 17

SECTION A

1. Which of the following describe the network security?

a. Network security is network that being created, stored, processed and


communicated using computers and networks.

b. Network security involves all activities that organizations, enterprises,


and institutions undertake to protect the value and ongoing usability
of assets and the integrity and continuity of operations.

c. Network security is used every day to conduct transactions and


communications among businesses, government agencies and
individuals.

d. Network security is used every day to protect the network.

2. Which of the following best describe the confidentiality based on


information security services?

a. Maintaining the privacy of data

b. Establishing proof of identity

c. Ability to prove that the sender actually sent the data

d. Computer assets are available to authorized parties when needed

3. Which of the following best describe the Non-repudiation based on


information security services?

a. Maintaining the privacy of data

b. Establishing proof of identity

c. Ability to prove that the sender actually sent the data

d. Computer assets are available to authorized parties when needed

4. Which of the following best describe the Authentication based on


information security services?

a. Maintaining the privacy of data

b. Establishing proof of identity

c. Ability to prove that the sender actually sent the data

d. Computer assets are available to authorized parties when needed

5. Which of the following best describe the Availability based on


information security services?
a. Maintaining the privacy of data

b. Establishing proof of identity

c. Ability to prove that the sender actually sent the data

d. Computer assets are available to authorized parties when needed

6. Which of the following is NOT the cause of the successful attack of a


hackers?

a. Lack of basic password security

b. Lack of updating computer system of application

c. Lack of client or computer users awareness

d. Lack of basic firewall port blocking

7. Which of the following is the security goals?

i. Confidentiality

ii. Integrity

iii. Authentication

iv. Availability

a. i,ii,iii

b. i,iii,iv

c. i,ii,iv

d. ii,iii,iv

8. Which of the following is NOT the security method?

a. Data communication

b. Administrative

c. Logon

d. Identification

9. Which of the security method best describe the statement ”The most
common form of security identification that is, verification of who a user
is and that the user is permitted to use the network”

a. Data communication

b. Administrative
c. Logon

d. Identification

10. Which of the following is NOT the internet services?

a. File sharing

b. File transfer

c. Remote Access to Host

d. Real time conferencing services

11. Which of the following know as security threat?

i. Data modification

ii. Hacking

iii. Cracking

iv. Spoofing

a. i,ii and iii

b. i,iii, and iv

c. ii, iii, and iv

d. i, ii, iii, and iv

12. Statement “Activities to breaks into someone else's computer system,


bypasses passwords or licenses in computer programs” refer to which
security threat?

a. Spoofing

b. Cracking

c. Sniffing

d. Hacking

13. Which of the following is NOT kind of threat in the network?

a. Sniffing

b. Interruption

c. Interception

d. Fabrication

14. Which of the following is the example of attack in the security enviroment?
i. Reconnaissance attack

ii. Denial of service attack

iii. Distributed denial of service attack

iv. Data disclosure attack

a. i, ii, iii

b. i, iii, iv

c. i, ii, iv

d. ii, iii, iv

15. The following is the identify of the threat in the security environment
EXCEPT...

a. Extensible threat

b. Unstructured threats

c. Structured threats

d. External threats

16. Statement “Someone who just like to know exactly how things work. They
don’t cause harm, but rather explore, experiment and gain knowledge”
best describe

a. Cracker

b. Attacker

c. Jumper

d. Hacker

17. Statement “attacker disables or corrupts networks, systems, or services


with the intent to deny the service to intended users and crashing the
system or slowing it down to the point where it is unusable “ is best
describe

a. Reconnaissance attacks

b. Access attacks

c. Denial of Services (DoS) attacks

d. Instrusion Prevention System (IPS) attacks

18. Malicious code attack mostly hides in the following application EXCEPT

a. Email
b. File transfer

c. Web content

d. Legitimate sites

19. The statement “It also passing the infection from one infected system to
another” best describe

a. Worm

b. Trojan

c. Horses

d. Virus

20. The statement” Flood of packet are sent to a server requesting client
connection. The packet contain invalid IP address” best describe

a. Ping of death

b. SYN Flooding

c. Data modification

d. Data disclosure

21. Statement “Hardware or software tool used to protect a single host or an


entire network. It functions to allow or deny access to incoming and
outgoing traffic” best describe

a. Firewall

b. Worm

c. Antivirus

d. Operating system patches

22. Which of the following is NOT the function of firewall

a. Separate public and private network

b. Prevent unwanted traffic

c. Monitoring system

d. Dial up modem

23. Which of following is NOT types of firewalls architecture

a. Dial-up Architecture

b. Artificial Architecture
c. Single Router Architecture

d. Firewall with Proxy Server

24. Which of following is types of firewall technologies

i. Static Packet Filtering

ii. Dynamic Packet Filtering

iii. Proxy

iv. Server Packet Filtering

a. i,ii, iv

b. i, iii, iv

c. ii, iii, iv

d. i, ii, iii

25. Which of the firewall are NOT examines each packet based on the
following criteria in the Static Packet Filtering

a. Source IP address

b. Source MAC address

c. Destination IP address

d. Destination service port

26. Viruses can infected through three (3) way EXCEPT

a. Backup disk

b. Internet

c. networked computers

d. removable disks

27. Which of the following example below viruses CANNOT infected

a. Shared network drive

b. Floppy disk

c. Paper documentation

d. Removal disk drive

28. Which of the following consist at least 2 interface in a firewall

i. Source IP Address
ii. Destination IP Address

iii. Public network

iv. Private network

a. i, ii

b. ii, iii

c. iii, iv

d. i, iv

29. What is the disadvantage of using single firewall configuration

a. ISP network is separated from other networks – limiting the intrusion

b. Implemented easily in an existing architecture

c. An intruder who gains access to a server in the ISP network may gain
access to other servers on the site

d. One firewall to purchase and manage

30. Which of the following is the system policy that an administrator should
NOT follow in the Windows Security Approach?

a. Password

b. Account

c. Audit

d. Monitor

31. Hot fixes and service pack are

a. Application

b. Patches

c. Software

d. Virus

e. Games

32. Which of the following is NOT the basic level of security in the computer
environment?

a. Sharing password

b. Secure your wireless network


c. Secure your backup tapes

d. Disable the Guest Account

33. What is the function of the Internet Protocol Security (IPSec) Filtering?

a. Used to help protect computers from network-based attacks from


threats such as viruses and worms.

b. Allow users to perform tasks on a computer

c. Privileges control access to computer and domain resources

d. Use a firewall if you have a full time internet connection

34. Which of the following is NOT vulnerabilities of Internet Information


Services

a. Large number of open ports

b. Default installs of operating system and applications

c. ISAPI Extension Buffer Overflows

d. Secure your wireless network

35. Which of the following is NOT the main features of Microsoft Security
Server ?

a. Network connectivity

b. Proxy connectivity

c. Server connectivity

d. Proxy security

36. What does authentication means in the network security enviroment?

a. process of proving one’s identity to someone else

b. Determine the level of access, or services to which user has access

c. monitoring what user do while logged in

d. allow user access without password for quick use

37. What does authorization means in the network security enviroment?

a. process of proving one’s identity to someone else

b. Determine the level of access, or services to which user has access

c. monitoring what user do while logged in


d. allow user access without password for quick use

38. What does accounting means in the network security enviroment?

a. process of proving one’s identity to someone else

b. Determine the level of access, or services to which user has access

c. monitoring what user do while logged in

d. allow user access without password for quick use

39. Which of the following is NOT the attack that can be launch if
authentication is not be implemented?

a. Eavesdropper attacks

b. Replay attacks

c. Duplicated file attack

d. Phishing attacks

40. Statement “Operations performed in converting encrypted messages to


plain text without initial knowledge of the crypto-algorithm and/or key
employed in the encryption” best refer to

a. Decryption

b. Encryption

c. Cipher Text

d. Cryptanalysis

41. Which of the following is the two classes of key-based encryption


algorithms

i. Symmetric

ii. Asymmetric

iii. Encryption

iv. Decryption

a. i,ii

b. i,iii

c. iii,iv

d. ii, iv

42. The following is the example of the symmetric( secret key) except
a. DES

b. IDEA

c. TWOFISH

d. ELGAMAL

43. Statement “Exchange of tokens that hide the implementation detail from
the higher level application and wrapping include confidentiality (secrecy)
and integrity (authenticity)” refer to

a. DNSSEC

b. GSSAPI

c. SSL

d. SHTTP

44. Which of the following is the application of VPN

i. Firewall based VPN

ii. Server based VPN

iii. Router based VPN

iv. Dedicated software or hardware

a. i,ii, iii

b. i, iii, iv

c. i, ii, iv

d. ii, iii, iv

45. Which of the types of backup that copy all the data in the hard disk

a. Full backup

b. Differential backup

c. Incremental backup

d. Imaging backup
46. Which of the types of backup that copy all the data that been choose by user to a
certain folder

a. Full backup

b. Differential backup

c. Incremental backup

d. Imaging backup

47. Which of the types of backup that copy all the folder in the storage that been choose

e. Full backup

f. Differential backup

g. Incremental backup

h. Imaging backup

48. Which of the following is not the hardware use for handling server disaster

a. UPS

b. RAID

c. VERITAS EXEC Backup

d. REDUNDANT Server

49. Which of the following is the advantage of using RAID in handling server
disaster

a. Organizing disks into a redundant array decreases the usable storage


capacity

b. Data may be overwritten by a system malfunction

c. A file may be damaged or deleted by user error and not noticed for
days or weeks

d. The entire array is at risk of physical damage

50. Which of the following is NOT the categorization of cluster in handling


server disaster

a. High-availability (HA) clusters

b. Load-balancing clusters

c. Grid computing

d. Backup cluster
SECTION B

CHOOSE TWO FROM FOUR QUESTION BELOW

1. a. Define network security (2


Marks)

- Network security involves all activities that organizations,


enterprises, and institutions undertake to protect the value
and ongoing usability of assets and the integrity and
continuity of operations.

b. Explain four type of internet services that can be found in the


network environment
(8 Mark)

i. electronic mail and news :

- WAYS FOR PEOPLE TO EXCHANGE INFORMATION WITHOUT


INQUIRING AN IMMEDIATE,INTERACTIVE RESPONSE

ii. file transfer :

- TRANSMITTING FILE OVER A COMPUTER NETWORK OR THE


INTERNET

- THE SIMPLEST WAY TO EXCHANGE FILES BETWEEN


COMPUTERS ON THE INTERNET

iii. remote access to host :

- THE ABILITY TO LOG ONTO A NETWORK IN DISTANT LOCATION


eg:telnet

iv. real time conferencing service :

- DESIGNED FOR INTERACTIVE USE BY ON-LINE PARTICIPANTS

c. Explain the security threat that can be found in the network


environment

(15
Marks)
i. data modification :

- ADALAH SATU USAHA UNTUK MENUKAR


MAKLUMAT OLEH SEORANG ATTACKER TANPA
SEBARANG KEBENARAN UNTUK MENGUBAHSUAI

ii. Hacking :

- PENGUBAHSUAIAN HARDWARE ATAU SOFTWARE


TANPA SEBARANG KEBENARAN UNTUK
MENCAPAI MATLAMAT DI LUAR TUJUAN ASAL
PEMBUATNYA.

- DILAKUKAN TANPA MENDAPAT SEBARANG


KEBENARAN SAH UNTUK SEBUAH KOMPUTER
MAHUPUN RANGKAIAN.

- ORANG-ORANG YANG TERLIBAT DALAM


KEGIATAN HACKING DIKENALI SEBAGAI HACKERS

iii. Cracking :

- MEMECAH MASUK KE DALAM SESEBUAH SISTEM


KOMPUTER ORANG LAIN DENGAN CARA BYPASS
PASSWORD DAN LESEN DALAM PROGRAM
KOMPUTER

- BERTUJUAN UNTUK MENGAUT


KEUNTUNGAN,BERNIAT JAHAT,MEMPUNYAI
TUJUAN TERTENTU ATAU KERANA TERDAPAT
CABARAN.

iv. Spoofing :

- KAEDAH SERANGAN PROGRAM KOMPUTER DI


MANA SESEBUAH PROGRAM TELAH DIUBAHSUAI
TANPA PENGETAHUAN TETAPI TETAP
DIJALANKAN SECARA BIASA, TETAPI PADA
REALITINYA IANYA TELAH DIUBAH SUAI DENGAN
TUJUAN UNTUK MENGELAKKAN MEKANISMA
KESELAMATAN.

v. Sniffing :

- SNIFFER PROGRAM MENGAWAL LALU LINTAS


DALAM RANGKAIAN
- DILAKUKAN UNTUK TUJUAN SAH SEPERTI
PENTADBIR DATA RANGKAIAN TETAPI
MELAKUKAN KERJA TIDAK SAH SEPERTI MENCURI
MAKLUMAT RANGKAIAN

- BERTUJUAN UNTUK MENCURI PASSWORD,EMAIL


TEXT DAN FILE TRANSFER

- MENYULITKAN LALULINTAS YANG MENGANDUNGI


MAKLUMAT SULIT

- MENGGUNAKAN SESEBUAH PERISIAN UNTUK


MENCARI KEDUDUKAN SNIFFER DALAM
RANGKAIAN

2. a. Differentiate between attackers and hackers (6


Marks)

ATTACKERS HACKERS

-SESEORNG YANG INGIN MENCURI --SESEORANG YANG MEMECAH MASUK


ATAU MENGGANGGU ASET ORANG KE DALAM KOMPUTER ATAU
LAIN KESELAMATAN RANGKAIAN

-MEMPUNYAI KEMAHIRAN -MEMPUNYAI PEMAHAMAN YANG


TEKNIKAL MENDALAM TENTANG KOMPUTER DAN
RANGKAIAN

-MENYERANG KOMPUTER UNTUK -TIDAK MELAKUKAN SEBARANG


MENYEBABKAN KEROSAKAN ATAU KEROSAKAN TETEPI LEBIH KEPADA
KESULITAN EKSPLORASI,EKSPERIMEN DAN
MENAMBAH PENGETAHUAN

b. Explain the attack example in the network system below

I. reconnaissance attack :

- JUGA DISEBUT SEBAGAI MENGUMPUL MAKLUMAT

- IANYA MENDAHULUI SERANGAN DoS

- INTRUDERS BIASANYA MELAKUKAN PING-


SWEEPS PADA SASARAN RANGKAIAN UNTUK
MENENTUKAN ALAMAT IP YANG AKTIF

II. access attack

- MERUJUK PADA MUAT TURUN DAN AKSES SISTEM


SECARA TIDAK SAH
- MUAT TURUN DATA TIDAK SAH SEPERTI
MEMBACA, MENULIS, MENYALIN ATAU
MEMINDAHKAN GAMBAR-GAMBAR YANG TIDAK
DIJANGKA AKAN DIAKSES OLEH INTRUDER

- AKSES SISTEM MERUPAKAN KEMAMPUAN


INTRUDER UNTUK MENGAKSES KEPADA ENJIN
TAMPA SEBARANG AKAUN ATAU PASSWORD

III. denial of service attack :

- PENYERANG AKAN MEROSAKKAN RANGKAIAN,


SISTEM ATAU PERKHIDMATAN DENGAN TUJUAN
UNTUK MENOLAK PERKHIDMATAN KEPADA
PENGGUNA YANG SAH

- MELLAMBATKAN SISTEM SEHINGGA IANYA TIDAK


BOLEH DIGUNAKAN

- BERUSAHA UNTUK MEMBANJIRI RANGKAIAN


SEHINGGA MENCEGAH LALULINTAS YANG SAH

IV. malicious code attack :

- MERUPAKAN APLIKASI AUTO-EXECUTEABLE

- SEJENIS ANCAMAN BARU YANG TIDAK DAPAT


DIHALANG OLEH ANTI-VIRUS SENDIRIAN

- BOLEH MENGAMBIL BENTUK KAWALAN ActiveX,


PLUG-IN,SCRIPT BAHASA UNTUK SEJUMLAH
ATURCARA BARU YANG DIREKA UNTUK
MENINGKATKAN LAMAN WEB DAN EMEL.

- SERANGAN PENOLAKAN PERKHIDMATAN

(12
Marks)

c. differentiate between worm, viruses and trojan horses


( 7 Marks)

WORM VIRUSES TROJAN HORSE

MEMPUNYAI MAMPU UNTUK MENYALIN TIDAK MAMPU MENGULANGI


KEBOLEHAN UNTUK DIRI SENDIRI DAN DIRI SENDIRI SEPERTI WORM
MENGULANGI DIRI MEMBIAK
SENDIRI DAN
MENIMBULKAN KESAN
NEGATIF

TIDAK PERLU MENJANGKITI DARIPADA TIDAK MEREBAK DENGAN


MENJANGKITI FAIL LAIN SATU SISTEM KEPADA MENJANGKITI FAIL-FAIL LAIN
UNTUK MEMBIAK SISTEM YANG LAIN

CONTOH : MORRIS CONTOH : BRAIN VIRUS CONTOH : BEAST


WORM

3. a. Explain the server based security componenets below

i. personal firewall

ii. anti-virus software

iii. operating system patches

iv. device hardening

(12
Marks)

b. differentiate between static packet filtering , dynamic packet


filtering, and proxy

(9 Marks)

c. explain the denial of service attack below

I. SYN Flooding

II. Ping of death

(4 Marks)
4. a. Explain the attacks that can be launched if authentication is not
implemented

(15
Marks)

b. Explain the standard and protocol below

I. DNSSEC

II. GSSAPI

(6
Marks)

c. Brief the different between modem pool replacement and dedicated WAN Link
Replacement

(4 Marks)

You might also like