You are on page 1of 9

SULIT FN612: NETWORK SECURITY

SECTION B: 70 MARKS
BAHAGIAN B: 70 MARKAH

INSTRUCTION:
This section consists of FOUR (4) structured questions. Answer ALL questions.
ARAHAN:
Bahagian ini mengandungi EMPAT (4) soalan berstruktur. Jawab SEMUA soalan.

QUESTION 1
SOALAN 1

CLO1 (a) List TWO (2) common causes of accidental data loss.
C1 Senaraikan DUA (2) punca lazim kehilangan data yang tidak disengajakan.
[2 marks]
[2 markah]

CLO1 (b) There are several methods which antivirus software will use to identify virus and
C2
malware. Determine the method used by antivirus software if the antivirus compares the
contents of a file to a dictionary of virus signatures.
Terdapat beberapa kaedah yang digunakan oleh perisisan antivirus untuk mengenalpasti
virus dan malware. Tentukan kaedah yang digunakan oleh perisian antivirus jika
antivirus tersebut membandingkan isi sesuatu fail dengan satu pangkalan data yang
mengandungi perincian virus.
[2 mark]
[2 markah]

CLO1 (c) Describe ONE (1) difference between Intrusion Detection System (IDS) and Prevention
C3 Detection System (IPS).
Terangkan SATU (1) perbezaan antara Intrusion Detection System (IDS) dan Prevention
Detection System (IPS).
[2 marks]
[2 markah]

13 SULIT
SULIT FN612: NETWORK SECURITY

CLO1 (d) List TWO (2) hardening tasks that you need to perform in order to secure your computer.
C4
Senaraikan DUA (2) tugas “hardening” yang boleh dilakukan bagi melindungi computer
anda.
[2 marks]
[2 markah]

CLO2 (e) Figure B1 shows the various types of threats. Name the threats as labelled.
C2
Rajah B1 menunjukkan pelbagai jenis ancaman dalam rangkaian. Namakan ancaman
tersebut mengikut label yang diberi.

Figure B1: Threats of Networks / Rajah B1: Ancaman Rangkaian


[2 marks]
[2 markah]

CLO2 (f) Explain how does the static packet filtering firewall examines each packet.
C2
Terangkan bagaimana penapisan paket statik dalam “firewall” memeriksa setiap
paket.
[2 marks]
[2 markah]

14 SULIT
SULIT FN612: NETWORK SECURITY

CLO2 (g) Describe TWO (2) vulnerabilities that exists in IIS (Internet Information Services)
C1
Jelaskan DUA (2) kelemahan Perkhidmatan Maklumat Internet.
[2 marks]
[2 markah]

CLO2 (h) Based on statement in Figure B2, explain the following terms:
C1
Berdasarkan kenyataan dalam Rajah B2, terangkan istilah berikut:

“The managing of Microsoft Windows security requires the implementation of


a number of System Policies”

“Pengurusan keselamatan dalam Microsoft Windows memerlukan


implimentasi beberapa system polisi”

Figure B2 / Rajah B2

i. Password Policy / Polisi Katalaluan


ii. Account Policy / Polisi Akaun
[2 marks]
[2 markah]

15 SULIT
SULIT FN612: NETWORK SECURITY

QUESTION 2
SOALAN 2

CLO2 (a) Describe TWO (2) characteristics of strong password.


C2
Terangkan DUA (2) ciri-ciri kata laluan yang kuat.
[2 marks]
[2 markah]

CLO2 (b) State TWO (2) minimum system security services in Windows.
C2 Nyatakan DUA (2) perkhidmatan sistem keselamatan minimum dalam Windows.
[2 marks]
[2 markah]

CLO2 (c) Give the definition of encryption.


C1 Berikan definisi “encryption”.
[2 marks]
[2 markah]

CLO3 (d) List TWO (2) features of good Virtual Private Network (VPN) Product.
C2 Senaraikan DUA (2) ciri-ciri produk Virtual Private Network (VPN) yang baik.
[2 marks]
[2 markah]

CLO3 (e) Differentiate between Symmetric and Assymetric key encryption.


C2 Bezakan antara “Symmetric” dan “Assymetric key encyption”.
[2 marks]
[2 markah]

(f) (i) State TWO (2) functions of encryption in a networking environment.


CLO3
C3 Nyatakan DUA (2) fungsi “encryption” di dalam persekitaran rangkaian.
[2 marks]
[2 markah]

16 SULIT
SULIT FN612: NETWORK SECURITY

(ii) State TWO (2) types of VPN (Virtual Private Network) tunneling protocols.
Nyatakan DUA (2) jenis protokol “tunneling” dalam VPN (Rangkaian Peribadi
Maya)
[2 marks]
[2 markah]

CLO3 (g) By using CAESAR Cipher method, interpret the ciphertext sentences below to
C3
plaintext sentences based on the left rotation of three places cipher as shown in
Diagram B1.

Dengan meggunakan kaedah CAESAR Cipher, tafsirkan ayat “ciphertext” di bawah


kepada ayat betul berdasarkan tiga tempat pusingan ke kiri seperti yang ditunjukkan
di dalam Rajah B1.

Plain a b c d e f g h i j k l m n o p q r s t u v w x y z
Cipher d e f g h i j k l m n o p q r s t u v w x y z a b c

Diagram B1/ Rajah B1

Ciphertext: qhwzrun vhfxuowb


Plaintext: ________________
[2 marks]
[2 markah]

CLO3 (h) List TWO (2) methods of backup.


C3 Senaraikan DUA (2) kaedah “backup”.
[2 marks]
[2 markah]

17 SULIT
SULIT FN612: NETWORK SECURITY

QUESTION 3
SOALAN 3

Company X is fully using Internet connection in running their business and they
do not trust all of their employees.
Syarikat X menggunakan perhubungan Internet sepenuhnya untuk perniagaannya
dan mereka tidak mempercayai kesemua pekerjanya.
Figure B3 / Rajah B3
CLO1 (a) As a network administrator, explain to your management about:
C3 Sebagai pentadbir rangkaian, terangkan kepada pihak pengurusan tentang:

i. Asset Identification
Pengenalpastian Aset

ii. Vulnerability Assessment


Penilaian Kelemahan

iii. Threats Identification


Pengenalpastian Ancaman
[3 marks]
[3 markah]

CLO1 (b) Based on Figure B3, state which security model that is suitable for this company and
C4
explain why do you choose that security model.
Berdasarkan Rajah B3, nyatakan model keselamatan yang sesuai digunakan oleh
syarikat ini dan terangkan mengapa anda memilih model keselamatan tersebut.
[3 marks]
[3 markah]

CLO1 (c) List THREE (3) types of threats to network security.


C1
Senaraikan TIGA (3) jenis ancaman kepada keselamatan rangkaian.
[3 marks]
[3 markah]

18 SULIT
SULIT FN612: NETWORK SECURITY

CLO1 (d) Identify THREE (3) types of firewall technologies.


C1
Kenalpasti TIGA (3) jenis teknologi “firewall”.
[3 marks]
[3 markah]

CLO2 (e) List THREE (3) types of malicious codes which can cause harm to most
C2 organizations as well as individual home users.
Senarai TIGA (3) jenis kod jahat yang boleh menyebabkan bahaya bagi kebanyakan
organisasi serta pengguna- pengguna di rumah.
[3 marks]
[3 markah]

CLO2 (f) Based on Figure B4 above, what type of firewall technologies shown and explain how
C2
does it work.
Berdasarkan Rajah B4 diatas, apakah jenis “firewall technology” yang ditunjukkan
dan terangkan bagaimana ia bekerja.

Figure B4 / Rajah B4

[3 marks]
[3 markah]

19 SULIT
SULIT FN612: NETWORK SECURITY

QUESTION 4
SOALAN 4

CLO2 (a) List the steps to turn on automatic updates for Windows machine.
C2
Senaraikan langkah-langkah untuk mengaktifkan kemas kini automatik untuk mesin
Windows.
[3 marks]
[3 markah]
(b) Explain THREE (3) benefits of Linux proxy server
CLO2
C2 Terangkan TIGA (3) faedah pelayan proksi Linux.
[3 marks]
[3 markah]

CLO2 (c) Differentiate between the following System Policy that is implemented on Microsoft
C1 Windows Operating System:
Bezakan antara sistem polisi berikut yang dilaksanakan dalam sistem
pengoperasian Microsoft Windows:

i. Audit Policy / Polisi audit


ii. User rights Policy / Polisi hak pengguna
[3 marks]
[3 markah]

CLO2 (d) Describe the purpose of authentication.


C2 Terangkan tentang tujuan pengesahan.
[3 marks]
[3 markah]

CLO3 (e) Explain how VPN (Virtual Private Network) can secures the network.
C2
Terangkan bagaimana Rangkaian peribadi maya boleh melindungi rangkaian.
[3 marks]
[3 markah]

20 SULIT
SULIT FN612: NETWORK SECURITY

CLO3 (f) Explain what would happen if the primary drive fails on the server that uses RAID 1
C3
technology.
Terangkan apa yang akan berlaku sekiranya pemacu utama gagal pada pelayan yang
menggunakan teknologi RAID 1.
[3 marks]
[3 markah]

SOALAN TAMAT

21 SULIT

You might also like