You are on page 1of 1

Time 3 hours

Q1: What is the difference between the following terms: ‫حدد الفرق بين المصطلحات التالية‬
A. Symmetric & Asymmetric encryption.
B. Stream and Block Cipher.
C. Interruption & interception security attack.
D. Modification & Fabrication security attack.
E. Passive & Active attack.
F. Data Encryption Standard (DES) & Advanced Encryption Standard (AES).
G. Key & password.
H. Encryption & Decryption.

Q2: Explain and Give Example for the following security principles; ‫أشرح مع االمثلة‬
‫نظريات األمن التالية‬
A. Don't talk to any one you don't know.
B. Accept nothing without guarantee.
C. Treat every one as enemy until proved otherwise.
D. Don't trust your friends for long
E. Use well-tried solutions
F. Watch the ground you are standing on for cracks.

Q3: Describe in detail the following topics? ‫أشرح بالتفصيل مايلي‬


A. Successful organization has multiple layers of security.
B. Objectives and characteristics of Hash algorithms.
C. Good security thinking principles.
D. Risk analysis: What is it, why we need, write its life cycle and mention its
main activities? ‫تحدث عن تحليل المخاطر وأهميتها ودورة حياتها وعرف جميع أنشطها‬

Q4: A. Draw to explain the following ‫أشرح بالرسم ما يلي‬:


1. Festal Schema
2. public key authentication
B. Write the main features of AES , mention the main functions and the role of
each one ? ‫تحدث عن نظام التشفير القياسي العالمي محدداً خصائصة ومهام اجراءاته‬
C. Define the REPLAY attack, how could avoid it and give example?

Q5: A. What is the brute force attack give example?


B. Discuss the relation between information security (protection) and access
facility (availability).
C. Define the following terms :( choose Five terms only)‫اختر خمسة مصطلحات وعرفها‬
1. Security 2. Attack 3. Week key 4. Cryptography 5. Firewall
6. Key entropy 7. Authentication 8. Authorization 9. Snooping
10. Denial of service DoS

You might also like