You are on page 1of 2

‫بسم هللا الرحمن الرحيم‬ ‫الجامعــة الوطنيـــة_ عـــــدن‬ ‫امتحانات الدور االول للفصل الدراسي األول‬ ‫ للطالب المنتظمين‬2012

/2013 ‫من العام األكاديمي‬ ‫المستوى الثالث‬ ‫ علوم‬: ‫القسم‬ ‫ الحاسوب‬: ‫كليه‬ ‫ محمد فضل‬.‫ د‬: ‫مدرس المادة‬ Network Security : ‫المقــرر‬ 2231/ / : ‫التـاريـخ‬ ‫ ساعات‬2 : ‫الزمــن‬ Answer any 4 questions ‫أجب عن أربعة أسئله فقط‬
1# (a) What are the five protections provided by Cryptography? (b) Select the correct answers; (i) Which of the following is a protection provided by hashing? a. confidentiality b. integrity c. availability d. authenticity e. padding (ii) Symmetric cryptographic algorithms are also called ………………..? a. cipherkey cryptography b. public/private key cryptography c. public key cryptography d. private key cryptography (iii) Which of the following is an asymmetric cryptographic algorithm? a. RSA b. MD5 c. SHA2 d. Diffie_Heuman e. AES f. Whirlpool 2# (a) What is the Padding as used in the Message Digest (MD) algorithm? (b) What do you mean by Script Kiddies? 3# (a) What are the categories of attackers peoples? List them and define any one? (b) Describe the Transposition cipher? Given the key “ aden city ”, encrypt the massage:

“the exam is very easy but we have to answer correctly”
4# (a) List the requirements to be satisfied by Hash function? (b) What do you mean by Spam? 5# (a) How to differentiate between: virus, and trojan-horse? (b) What do you mean by (i) Integrity, (ii) Non Repudiation? 6# (a) Explain by using only a neat sketch, how the following security service is achieved: Data Integrity and Authentication and Confidentiality (b) How to differentiate between: Worm, and Spy-ware?

‫تمنياتي لكم بالنجاح‬

how the Confidentiality service is achieved? 2# (a) What are the difficulties in defending against attacks? (b) Define: (i) Information Security. MD2. SHA2.‫بسم هللا الرحمن الرحيم‬ ‫الجامعــة الوطنيـــة_ عـــــدن‬ ‫امتحانات الدور الثاني للفصل الدراسي األول‬ ‫ للطالب المنتظمين‬2012/2013 ‫من العام األكاديمي‬ ‫المستوى الثالث‬ ‫ علوم‬: ‫القسم‬ ‫ الحاسوب‬: ‫كليه‬ ‫ محمد فضل‬. and (ii) Cryptography. SHA4. AES. (b) What is the list of requirement to be satisfied by one-way Hash function? 4# (a) What are the three primary objectives of malwares? (b) What are the Malwares for profit? 5# (a) Explain by using only a neat sketch. MD9. 3# (a) Which of the following are HASH algorithms? DES.‫ د‬: ‫مدرس المادة‬ Network Security : ‫المقــرر‬ 2231/ / : ‫التـاريـخ‬ ‫ ساعات‬2 : ‫الزمــن‬ Answer any 4 questions ‫أجب عن أربعة أسئله فقط‬ 1# (a) What do you mean by (i) Hackers (ii) Spam (b) Explain by using only a neat sketch. RSA. how the following security service is achieved: Data Integrity and Authentication (b) What are the different between the Virus and the Worm? 6# (a) What is the Private key encryption technique? (b) Describe the Mono_alphabetic and homo_alphabetic Substitution cipher? ‫تمنياتي لكم بالنجاح‬ .