Network Security and Cryptography
Sample
Examination Paper
Answer ALL questions.
Clearly cross out surplus answers.
Time: 3 hours
The maximum mark for this paper is 100.
Any reference material brought into the examination room must be
handed to the invigilator before the start of the examination.
Answer ALL questions
Question 1 – 25 Marks
(a) Explain three key principles of network security and provide a practical example for
each.
[6 marks]
(b) Differentiate between symmetric and asymmetric key cryptography. Provide
scenarios where each is applicable.
[4 marks]
(c) Explain the importance of S/MIME in email security. How does it contribute to the
confidentiality and integrity of email communications? [5 marks]
(d) Describe two common web security considerations that organizations should
address to protect against cyber threats. Provide examples for each consideration.
[5 marks]
(e) Define what VLAN (Virtual Local Area Network) is and how it helps in network
segmentation. [5 marks]
Question 2 – 25 Marks
(a) Explain the purpose of a key exchange protocol in secure communication. Provide
an example of a key exchange protocol and describe its basic operation?
[15 marks]
(b) Define what a Message Authentication Code (MAC) is and why it is essential for
ensuring data integrity in communication. Give an example of a scenario where
MAC is applied?
[10 marks]
Page 2 of 3
Introduction to Data Science and Big Data © NCC Education Limited 2024
Question 3 – 25 Marks
(a) A popular e-commerce website allows users to upload profile pictures. Discuss the
potential security risks associated with inadequate input validation for image uploads.
What measures should the website implement to ensure the security and integrity of
user-uploaded content?
[15 marks]
(b) A financial institution is developing a real-time trading system where multiple users
can execute transactions concurrently. Discuss the implications of race conditions in
this context. How can the development team design the system to minimize the risk
of race conditions and ensure the accuracy of financial transactions?
[10 marks]
Question 4 – 25 Marks
(a) Define the role of firewalls in network security. Discuss how intrusion detection
systems contribute to overall security.
[7 marks]
(b) A company is planning to implement a wireless network. Outline the security
considerations the company should address. Provide recommendations for encryption
protocols and additional security measures.
[8 marks]
(c) Discuss the role of risk management in information security. Explain how organizations
can identify, assess, and mitigate risks. Provide real-world examples to illustrate the
importance of effective risk management in ensuring network security.
[10 marks]
End of paper
Page 3 of 3
Introduction to Data Science and Big Data © NCC Education Limited 2024