0% found this document useful (0 votes)
124 views3 pages

Network Security Exam QP

The document is an examination paper on Network Security and Cryptography, consisting of four questions, each worth 25 marks. It covers topics such as key principles of network security, cryptography types, email security, web security considerations, key exchange protocols, and risk management. Students are required to answer all questions within a 3-hour timeframe, with a maximum score of 100 marks.

Uploaded by

Arkarmin Argyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views3 pages

Network Security Exam QP

The document is an examination paper on Network Security and Cryptography, consisting of four questions, each worth 25 marks. It covers topics such as key principles of network security, cryptography types, email security, web security considerations, key exchange protocols, and risk management. Students are required to answer all questions within a 3-hour timeframe, with a maximum score of 100 marks.

Uploaded by

Arkarmin Argyi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Network Security and Cryptography

Sample

Examination Paper
Answer ALL questions.

Clearly cross out surplus answers.

Time: 3 hours

The maximum mark for this paper is 100.

Any reference material brought into the examination room must be


handed to the invigilator before the start of the examination.
Answer ALL questions

Question 1 – 25 Marks
(a) Explain three key principles of network security and provide a practical example for
each.
[6 marks]

(b) Differentiate between symmetric and asymmetric key cryptography. Provide


scenarios where each is applicable.
[4 marks]

(c) Explain the importance of S/MIME in email security. How does it contribute to the
confidentiality and integrity of email communications? [5 marks]

(d) Describe two common web security considerations that organizations should
address to protect against cyber threats. Provide examples for each consideration.
[5 marks]

(e) Define what VLAN (Virtual Local Area Network) is and how it helps in network
segmentation. [5 marks]

Question 2 – 25 Marks
(a) Explain the purpose of a key exchange protocol in secure communication. Provide
an example of a key exchange protocol and describe its basic operation?

[15 marks]

(b) Define what a Message Authentication Code (MAC) is and why it is essential for
ensuring data integrity in communication. Give an example of a scenario where
MAC is applied?

[10 marks]

Page 2 of 3
Introduction to Data Science and Big Data © NCC Education Limited 2024
Question 3 – 25 Marks

(a) A popular e-commerce website allows users to upload profile pictures. Discuss the
potential security risks associated with inadequate input validation for image uploads.
What measures should the website implement to ensure the security and integrity of
user-uploaded content?
[15 marks]

(b) A financial institution is developing a real-time trading system where multiple users
can execute transactions concurrently. Discuss the implications of race conditions in
this context. How can the development team design the system to minimize the risk
of race conditions and ensure the accuracy of financial transactions?
[10 marks]

Question 4 – 25 Marks

(a) Define the role of firewalls in network security. Discuss how intrusion detection
systems contribute to overall security.

[7 marks]

(b) A company is planning to implement a wireless network. Outline the security


considerations the company should address. Provide recommendations for encryption
protocols and additional security measures.

[8 marks]

(c) Discuss the role of risk management in information security. Explain how organizations
can identify, assess, and mitigate risks. Provide real-world examples to illustrate the
importance of effective risk management in ensuring network security.

[10 marks]

End of paper

Page 3 of 3
Introduction to Data Science and Big Data © NCC Education Limited 2024

You might also like