You are on page 1of 4

‫غالف االختبار النصفي (نظري) ‪MidTerm Exam Cover‬‬

‫الربنامج‪ :‬تقنية املعلومات‬ ‫قسم‪ :‬تقنية املعلومات‬ ‫كلية‪ :‬علوم احلاسب وتنية املعلومات‬

‫‪ 1443-1442‬هـ‬ ‫للعام اجلامعي | ‪Academic Year‬‬ ‫الثاني‬ ‫اختبار الفصل الدراسي | ‪Semester‬‬

‫معلومات املقرر | ‪Course Information‬‬

‫‪IT10602‬‬ ‫رقم املقرر |‪Course Code‬‬ ‫أسس األمن السيرباني‬ ‫اسم املقرر | ‪Course Name‬‬
‫د‪ .‬علي حسني أبوطاحون‬ ‫منسق املقرر | ‪Coordinator‬‬ ‫د‪ .‬علي حسني أبوطاحون‬ ‫أستاذ املقرر| ‪Instructor‬‬

‫معلومات الطالب | ‪Student Information‬‬


‫الرقم الجامعي ‪Student ID‬‬ ‫اسم الطالب | ‪Student Name‬‬

‫معلومات اإلختبار | ‪Exam Information‬‬

‫التاريخ | ‪Date‬‬ ‫رقم القاعة | ‪Room No.‬‬

‫ساعة | ‪Hours‬‬ ‫‪2‬‬ ‫زمن االختبار ‪Exam Duration‬‬ ‫‪1‬‬ ‫‪0‬‬ ‫‪0‬‬ ‫‪0‬‬ ‫‪−‬‬ ‫‪0‬‬ ‫‪8‬‬ ‫‪0‬‬ ‫‪0‬‬ ‫فرتة االختبار | ‪Exam Period‬‬

‫املعرفة و الفهم‬ ‫املهارات‬ ‫القيم‬ ‫خمرجات التعلم للمقرر‬


‫‪Knowledge & Understanding‬‬ ‫‪Skills‬‬ ‫‪Values‬‬ ‫‪Learning Domains Course‬‬
‫‪K1‬‬ ‫‪K2‬‬ ‫‪S1‬‬ ‫‪S2‬‬ ‫)‪Learning Outcomes (CLOs‬‬
‫اجملموع‬
‫‪Total‬‬ ‫أرقام األسئلة التي تقيس‬

‫‪Q1‬‬ ‫‪Q2‬‬ ‫‪Q3‬‬ ‫‪Q4‬‬ ‫املخرجات‬


‫‪No. of Questions that‬‬
‫‪measure the CLOs‬‬
‫ً‬
‫‪20‬‬ ‫‪5‬‬ ‫‪5‬‬ ‫‪5‬‬ ‫‪5‬‬ ‫رقما | ‪Number‬‬ ‫الدرجة‬
‫ً‬ ‫الكلية ‪Full‬‬
‫‪Twenty‬‬ ‫‪Five‬‬ ‫‪Five‬‬ ‫‪Five‬‬ ‫‪Five‬‬ ‫كتابة | ‪Written‬‬
‫‪Mark‬‬
‫ً‬
‫رقما | ‪Number‬‬ ‫درجة الطالب‬
‫ً‬ ‫‪Student‬‬
‫كتابة | ‪Written‬‬
‫‪Mark‬‬
‫د‪ .‬علي حسين أبوطاحون‬ ‫السم | ‪Name‬‬ ‫أستاذ املقرر‬
‫التوقيع ‪signature‬‬ ‫‪Instructor‬‬

‫السم | ‪Name‬‬ ‫املراجع‬


‫التوقيع ‪Signature‬‬ ‫‪Reviewer‬‬

‫*تتبع األوزان والدرجات المخصصة لالختبار النهائي حسب البلوبرنت ‪ Blue print‬المعد لقياس مخرجات المقرر والمعتمد من منسق المقرر مع‬
‫ادراج ‪QR code‬‬
Answer the following Questions

Question 1: (CLO 1.1) (5 Marks)

1. Draw the risk life cycle [2 marks]

2. Define the following terms: [2 marks]


Attack:
………………………………………………………………………………………………………...………………
…………………………………………………………………………………………………………………..……

Authentication:
………….…..…………………………………………………………………………………………………………
……………………………………………………………………………………………………………………...…

3. Give two examples of system vulnerabilities. [1 mark]


……………………………………………………………………………………………………………………...…
..……………………………………………………………………………………………………………….………
……………………………………………………………………………………………………………….………..
……………………………………………………………………………………………………………………...…

Question 2: (CLO 1.2) (5 Marks)

1. Fill in the following sentences with the appropriate word. [3 marks]


(confidentiality – cyberattacks – cyberspace – integrity – availability – confidentiality breach – integrity
breach, availability breach – low level – high level)
a. The …availability… ensures the timely and reliable access to and use of information and
systems.
b. …cyberspace… is composed of hundreds of thousands of interconnected computers, servers,
routers, switches and fiber optic cables that allow our critical infrastructures to work.
c. The ……availability breach…. occurs when the authorized user is unable to access online
services or personal information that he/she is authorized for.
d. Protecting information on competitive future products before their release requires …high level..
of confidentiality.
e. Getting access illegally to the system and establishing control for carrying out malicious
activities is known as ………cyberattack…..

Question 3: (CLO 2.1) (5 Marks)

Choose the correct answer

1. The main objectives of a hacker for conducting cyberattacks are …………….


i. Achieving monetary gains
ii. Damaging the brand value of the other party
iii. Obtaining government and business secrets
iv. All are true
2. A new form of cyberattack to be used for stealing the cryptocurrency is called ………………
i. phishing
ii. cryptojacking
iii. cyberstalking
iv. MITM
3. The Spamming is a widespread form of malicious attacks used to send the unsolicited messages through
different modes of messaging such as
i. instant messages
ii. emails
iii. ads,
iv. All are true
4. The main sources of confidentiality breach include ……………….
i. Leaving computers with confidential information unattended.
ii. Providing authorized access to the appropriate person.
iii. Consulting company employees respecting confidentiality agreements.
iv. All of the above
5. If person X changed his grade from 60 to 90, this is called ………….
i. Integrity breach
ii. Availability breach
iii. Confidentiality breach
iv. None of the above
Question 4: (CLO 2.2) (5 Marks)

True / False Questions


1. A web service running on a server may have a vulnerability, but if it’s not connected to T
the network, risk is 0.0.
2. Cybersecurity keeps the valuable data safe from external threats. T
3. Cybersecurity deals with information, regardless of its format—it encompasses paper F
documents, digital and intellectual property in people’s minds, and verbal or visual
communications.
4. Detect means implementing activities to identify the occurrence of a cybersecurity event. T
5. The confidentiality of digital information can be maintained using several different T
means, including access controls, file permissions and encryption.
6. Breaching “CIA” triad – Confidentiality, Integrity, and Availability – makes an F
unsuccessful cyberattack.
7. If the hacker gained access to a web server and could view a file on the server containing F
credit card numbers, this is called integrity breach.
8. If a student cannot open web content in a computer science lab, this is called F
confidentiality breach.
9. The victim is difficult to note passive attacks as this sort of attack is conducted in secret T
10. In the “Man-in-the-Middle” or MITM cyberattack, the hacker intercepts the normal T
connection between the user and the web server without any knowledge of both user and
server.

End of Exam, Good Luck…

You might also like