You are on page 1of 2

Irbid Private University

Faculty of Sciences and Information ‫جــامـعـة أربد االهلية‬


Technology ‫كـليــــة العلوم تكنولوجيا المعلومات‬
Cyber Security Department ‫قـســـم االمن السيبراني‬
Summer Semester ‫الفصل الدراسي الصيفي‬
Academic Year 2022 /2023 2022/2023 :‫العام الدراسي‬
Date: Thursday 27/ 7 /2023
Assignment ( 2)

Course No.: Course Name: Advanced Cyber Security

Instructor: Dr. Adnan Al- Helali


Total Mark (10 )

: ‫أسم الطالب‬ :‫رقم الطالب‬

A // (4 Marks) Choose the correct answer?


1- In the following diagram, IoT data transmission occurs in which of the following
correct sequence.

a) Risk, Threat, Threat Agent, Vulnerability


b) Vulnerability, Threat Agent, Threat, Risk.
c) Threat Agent, Threat, Vulnerability, Risk.
d) Threat, Threat Agent, Risk, Vulnerability.

2- Which of the following services used to verify the identity of someone (user, device, or other
entity) who wants to use data, resources, or applications?
a) Confidentiality
b) Availability
c) Integrity
d) Authentication
3- For which of the following Threat Exposure an external authentication server like
TACKAC, RADIUS or KERBOUS may be implemented?
a) Low Threat Exposure
b) Medium Threat Exposure
c) High Threat Exposure
d) Medium and High Threats Exposure
e) None of them
4- Which of the following password attack, the attacker trying systematically entering
every password word prepared by the attacker based on the knowledge and
information of resources and its environment?
a) Eavesdropping Attack
b) Password stealing Attack
c) Brute force Attack
d) Dictionary Attack
e) None of them
B// [3 Marks] Answer with True or False?
1- According to guidelines for Access Control, you let access of operating system source
files, configuration files, and their directories to all users and authorized administrators
[ ].

2- The attacks like Denial of Service (DOS) can’t be avoided with the deployment of
Authentication [ ].

3- For high threat a choice could be made from something you have such as tokens, smart
cards and biometrics devices [ ].

C// (3 Marks) Explain the following three methods of server authentication?


1. for low level threat:

2. for medium level threat:

3. for high level threat:


Good Luck 27/7/2023

Dr. Adnan Al-Helali Page 2

You might also like