You are on page 1of 22
REPUBLIC OF CAMEROON REPUBLIQUE DU CAMEROUN Pence-Work-Fatherland MINISTERE DE LENSEIGNEMENT SUPERIEUR MINISTRY OF HIGHER EDUCATION SXAMEN HIGHER NATIONAL COMMISSION FOR THE ORGANISATION OF COMMISSION NATIONALE D'ORGAN HIGHER NATIONAL DIPLOMA EXAM (HIND) EXAM NATIONAL DIPLOMA EXAM (I National Exam of Higher National Diploma— 2021 Session Spécialty/option ; Network and Security Paper ; Information Security ‘ Duration : 4 hours Credits : 03 INSTRUCTIONS FOR THIS PAPER This paper contains two sections: Section A and Seetion B. Section A offers 20 Multiple Choice Questions and structural questions. Section B also offers 20 MCQ Questions and some Structural Questions. Both sections are compulsory. SECTION A: NETWORK SECURITY (50 MARKS) Al: MCQs: Circle the right answer (0.5*20=10marks) 1. A small program that changes the way a computer operates. a) Worm b) Trojan ¢) Bomb d) Virus 2. A program that copies itself. a) Worm ») Virus ©) Trojan @) Bomb 3, Anattack in which the site is not capable of answering valid request. a) Smurfing +b) Denial of service ) E-mail bombing 4) Ping storm 4, The process of transforming plain text into unreadable text. a) Decryption *b) Eneryption ©) Network Security 4d) Information Hiding 5, An algorithm used in eneryption is referred to as cipher. a) True ) False 6. A process of making the encrypted text readable again. a) Decryption b) Encryption ) Network Security d) Information Hiding Page 1 of 6 7. WTLS stands for? a) Wireless Transport Security Layer b) Wireless Transfer System Layer so) Wireless Transfer Security Layer 4) Wireless Transport System Layer 8. The protocol designed to make the security of wireless LAN as good as that of wired LA’ +a) WTLS b) WEP c) RSN d) WP 9% sovssee i840 protect data and passwords. a) Eneryption b) Authentication ©) Authorization 4) Non-repudiation 10. The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iy) Firewalls ) i, ii, iii and iv only ©) ii, iii, iv and v only 11. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as. a) Chock point ©) firewall point -b) meeting point d) secure point 12, Which of the following is / are the types of firewall? a) Packet Filtering Firewall b) Dual Homed Gateway Firewall ©) Screen Host Firewall ‘'d) All of the above 13. The components of IP security includes ... “a) Authentication Header (AH) b) Encapsulating Security Payload (ESP) ¢) Internet key Exchange (IKE) 4) All of the above 14, Network security consists oft *a) Protection b) Detection c) Reaction ‘@) Alllof the above 15, Which of the following we should configure your systems and networks as correctly as possible? a) Protection b) Detection c) Reaction d). None of the above Page 2 of 6 16, Interaction between the client and server starts via the message. a).client_hi “b) client_hello _c) server_hello d). server_hi 17, What is true about Email security in Network security methods? sa) Phishing is one of the most common ways attackers gain access to @ network. b) You should know what normal network behavior looks like so that you can spot anomalies or breaches as they happen. ©) Youneed to employ hardware, software, and security processes to lock those apps down. d) Allofthe above 18. What is true about VPN in Network security methods? a) A tool that authenticates the communication between a device and a secure network *b) VPN creating a secure, encrypted "tunnel" across the open internet. ©) VPN typically based on IPsec or SSL d) Allofthe above 19. The text that gets transformed using algorithm cipher is called? a) Complex text b) Transformed text c) Plain text _d). Scalar text 20. Security features that control that can access resources in the OS. a) Authentication b) Identification ¢). Validation d). Access control A2- STRUCTURAL QUESTIONS (40 MARKS) Answer all questions on this section. 1. Explain the importance of authentication, (4mks) ~ 2. What is Proxy Server? (4mks) 3. If you work with a Linux server, what are the three signific pent ae you must take in order to secure it? (4mks) Ho 4, Which is the better security measure, HTTPS or SSL” amie 5. Wep Accomplishes Confidentiglity By Taking Unencrypted Text And Then Encrypting Or "scrambling" It Into ¢'"”" So That It Cannot Be Viewed By Unauthorized Parties While Being Transmitted? (2mks) 6. ____ Ensures That Only Authorized Parties Can View Information? (2mks) The Goal Of A ye’ _ Is To Hide The Ip Address Of Client Systems Inside The Secure Network? (2mks) 8. How Does Symmetric Key Encryption Work? (6mks) 9. Explain how an operating system help administrator to control a network and manage security. (6mks) 10. Why does an Active FTP not work with network firewalls? (6mks) ce Page 3 of 6 nS = ae eo SECTION B: NETWORK ADMINISTRATION AND SECURITY. (S0MARKS) SECTION B: Bi- MULTIPLE CHOICE QUESTIONS (10 MARKS) Mos: Cire the right answer (0.5%20°10 marks) 1), What is Active Directory designed for? a. Itis completely useless \p._ It is designed to store information about all of the objects on the network, including users, grOUups, computers, printers, and even software, ¢, Itis designed to protect the network against threats on the Internet, d._Itis designed to mess up networks 2) Which type of installation gives you a choice where to install Windows? ‘a. Custom (advanced) —b. Network ¢. Upgrade d.Typical 3) Inan Active Directory Tree or Forest, each domain controller will store a copy of its own domain. “True False 4) Active Directory is a troubleshooting tool. False ‘True 5) When installing Windows Server 2008 64bit what is the minimum amount of RAM required? ‘.. 512MB b.128MB ——c. 64MB d.10KB 6) A Windows 2008 Domain can contain more than one Domain Controller. False “rue 7) A global catalog server is available to directory clients when Domain Name System (DNS) servers can locate it as a global catalog server. In which order do the following events need to ‘occur before the catalog server is ready? ‘A) The Net Logon service on the domain controller has updated DNS with global-catalog- specific service (SRV) resource records. B) The isGlobalCatalogReady root1)SE attribute is set to TRUE. C) The global catalog receives replication of read-only replicas to the required occupaney level. Jy. C then B, then A b. C then A, then B c. A then C, then B d.B then C, then A 8) Ifyou wanted to require that a user enter an Administrator password to perform administrative tasks, what type of user account should you create for the user? \a, Administrator User account b. Standard User account ¢, Power User account 4a. Authenticated User account 9) You have a DNS server that contains corrupt information. You fix the problem with the DNS server, but one of your users is complaining that they are still unable to access Internet resources. You verify that everything works on another computer on the same subnet. Which command can you use to fix the problem? Page 4of 6 a.IPCONFIG /flush /b. IPCONFIG /flushdns ¢. PING /flush qd. GROPE /flushdns of the following information can be configured on a VPN client so that it can access a 10) W VPN server? (Choose two answers.) Xa. IP address b. MAC address %e. Domain name d. Connection address 11) Machine that places the request to access the data is generally called as a. Server Machine b. Client Machine c. Request Machine \d. None of the above 12) The applications of the Client and Server Model are a, World Wide Web b. Network Printing c. Email d, All of the above 13) Stephanie is in charge of a small network and wants to make it simple but secure. Which network(s) would be the best for Stephanie to set up? a, WAN Nb. Peer-to-peer c. Server-based d. Master domain 14) You have a policy applied at the domain level that you don’t want applied to five computers in your organization. Which of the following should you configure to accomplish this goal? a. Security filtering b. WMI filtering c, Loopback processing d, Slow-link processing 15) The default port for Apache/Http is? a) 8080 b) 80 ©) 8443 d) 91 e) None of the above 16) What does GNU stand for? 4a) GNU’s not Unix b) General Unix c) General Noble Unix d) Greek Needed Unix e) None of the above 17) How will you add a new user (say, tux) to your system.? a) useradd command b) adduser command ©) linuxconf command 4) Allof the above e) None of the above Page 5 of 6 18) How many primary partition is possible on one drive? a) 1 b) 2 0) 4- 19) From the following which is not an RPM based OS.? a) RedHat Linux b) Centos ©) Scientific Linux ~d) Debian e) Fedora 20) What layer protocol is responsible for user and the application program support such as passwords, resource sharing, file transfer and network management? a) Layer 4 protocols b) Layer 5 protocols ©) Layer 6 protocols ~d) Layer 7 protocols ©) None of the above B2— STRUCTURAL QUESTIONS (40 MARKS) ‘What can be the impact ofa computer network attack? (3mks) - 1. 2. What is the objective of information security within an organization? (3mks)~ 3. What are the meaning of threat, vulnerability, and risk? (3mks) 4. Whats /etc/passwd? (2mks) 5. What are the best defenses against a brute force login attack? (3mks) 6. Which is the better security measure, HTTPS or SSL? (2mks) 7. Tf you work with a Linux server, what are the three significant steps you must take in order to secure it? (3mks) Differentiate between HTTP and HTTPS. Which ports do they used? (6mks) What are proxy servers and how do they protect computer networks? (3mks) 10. How would you determine the connection path between a local host and a server? (3mks) 11. Why is it easier to maintain permissions via groups instead of individually? (6mks) 12, What is port forwarding? Give an example of using port forwarding. (3mks) 8. o Page 6 of 6 REPUBLIQUE DU CAMEROUN REPUBLIC OF CAMEROON Pais-Traval-atre Peace Work Fatherland MINISTERE DE LIENS (GNEMENT SUPERIEUR. MINISTRY OF HIGHER EDUCATION “MISSION TEXAM(HND) HIGHER NATIONAL DIPLOMA. sp GOMMISSION NATIONALE DORGANISATION DE, NATIONAL Ci LIEXAMEN HIGHER NATIONAL DIPLO} National Exam of Higher National Diploma-New program — 2021 Session Specialty/option : Telecommunication (TEL) and Network Security (NWS) Paper : Signal Processing ' Duration : 3 hours Credits : 05, qo INSTRUCTIONS: Answer All Questions SECTION A: FUNDAMENTAL OF SIGNALS (10 MARKS) 1, AnLTI system has the impulse response A) = u(t) — 2u(t- 1) + u(t — 2) (@) Sketch the impulse response h(¢). (2 marks) (b) Determine whether this system is causal; (2 marks) (©) Determine whether this system is stable; (2 marks) 2. A 100-Hz sinusoid x(t) is sampled at 240 Hz. (a) Has aliasing occurred? marks) (6) How many full periods of x(t) are required to obtain one period of the sampled signal? (2 marks) SECTION B : ANALOGUE SIGNAL PROCESSING (14 MKS) Some useful Fourier Transform Pait 5 rect(£) Tsine (22), Ssine(Bt) = reet($) 1. Find and sketch the Fourier Transform (magnitude and phase spectra) for the time-domain signals: h(t) = 6sinc(0t) and k(¢) = 6 rect (2) (6 marks) 2. The signal v,(t) = 10 rect(t) is applied to the input of the network with the frequeney response H(w) = rect(w/4n) as shown in Figure 1 (a) Express the network response v)(¢) in terms of v(t) and the impulse response A(O) of the network. (2 marks) (b) Find and sketch the frequency spectrum of the output signal V2(w). (6 marks) Ho) 4 eee f . —2n oO Qn o Figure 1 Page 1 of 2 SECTION C: DIGITAL SIGNAL PROCESSING (16 MKS) 1. A digital Filter is represented by the block diagram in Figure 2. (a) Find the difference-equation model of this filter. (2 marks) (b) Find the filter transfer function. (marks) (©) Determine the range of the parameter a for which this system is BIBO stable. (2 marks) (@) Find the impulse response of this system. (2 marks) (©) Let a=0.5. Find the unit step response for this system, (2 marks) x@ ? ¥@) az Figure2 ” 2, Givena digital sequence x[n] for 0 3)? ©.46 D6 8) The probability of having 0 head in two tosses of «fair coin is cl D.0 Page 1of7 9) The Laplace transform £{sin2t) is z 2s s “se Bee Cae rn 10) The probability of having at least 1 head in two tosses of a fair coin is AL % B.% C% D1 11) The following equations: conn is equal to: A. cosx B. cos3x cl D. sinx is equal to B.13 c.23 D.0 2ne1 2n-1 * Qnat B. ora A 15)When the lim, f(x) = £0, it implies Possibility of A. avertical asymptote _C. a quadratic asymptote B. horizontal asymptote _D. an oblique asymptote 16) The Domain of definition of the function: f(x) = ~—* is A. }0,1[u]1, +00 C.0,eLule,+00[ B. ]1,+0[ D. Je, 1[u}1, +0 [ 17) the parity of the function f(x) = is, xia A, even B. odd C. neither odd noreven —_D. positive 18) The equation, log(x -1) +log(x+1)=2log(x+2) has as solution x= A. 4/5 B. -5/4 C. 5/4 D. -4/5 19) In the D’Alambert’s theorem the lim “t+! =< 1 implies A, Convergence B. Divergence C. Inconclusive _D. Constant Page 2 0f7 20) Three numbers are in arithmetic progression. Their sum is 9 and their product is 20.25. ‘What are the three numbers? A. 5/2, 1/2,3/2 B.7/2,5/2,6/2 C. 3/2, 3, 9/2 D. 5/2,3,% 21) The period of the function shown graphically below is r A.2 B.8 C6 D.3 22)'The exact solution to the followings i 72> ax is b Tee a. Vf, B.2v3 c¥% v# 23) The function shown graphically below is ~ i Be . an even funetion an odd funetion neither odd nor even function ‘an asymmetric function pomp 24) If In(1 + y) = $2? + Ind then A. ysixt+ind-1 Cy =4er — Ind Bey sso Dy= 25) Find the value(s) of 2 of x*y + y? = Saty=1 A, ~2 only B.2 only ca? D £t 26) When fe+ T) = f(0), Tis called ‘A, the fundamental period of f(¢) C. constant of f(t) B. the period of f(t) D. increment of f(t) Page 3 of 7 27) Which theorem is verified if f() is continuous on [a,b], differentiable on Ja, bL f(a) = f(b) and there exist at least one number ¢ within Ja, bl, such that f’(c) = 0, ‘A, Cauchys theorem C, Rolle’s theorem B. Green’s theorem D. Mean value theorem 28) The following equation, Pdx + Qdy = JIp (22-2) dady, expresses thes C. Rolle’s theorem D. Mean value theorem ‘A. Cauchy's theorem B, Green’s theorem 29) tanh (4) A. tan(S4) —B.tan™ om D.In(@? - 1)-In@? +) identical to 30) If f(x) = 3%, then f’(x) =; A. In3x B. 3*In3 C.3%) Deora _ 31) The value of x in the equation 3.72 = In &) is A x=ae Bx=oe Gxes.11e%% Di x= simon 32)Ify = In(7 — 4x) then 2 is 4 4 ee 7-4x Tax Tax 33) Consider the sequence U, =~ z-a5y The first term of the series S A. = 1/2 B.S, = 1/6 C.5,=1/3 D.S,=0 34) The domain of definition of the function f (x) = —~—— ais: ei A, Jeo, ~2[U]-2, -1[U]-1, +00 B.]-2, -1[ C.J-2, -1[U[-1, +f —2]U]-2, +f 35) From the Cauchy’s criteria, lim “/U,, < 1, implies A. divergence _B. inconclusive C. convergence __D. constant 36) The value(s) of x = C for f(x) = x? + 2x*—x on [-1,2], for which the mean value theorem is verified Biv eae 2-5 =2eVi5 BO p.¢ = 285 onty only Page 4 of7 37) For three vectors v4,02,03 in a vector space and constants ¢4,¢2,¢a, from the set of real numbers, ¢,¥; + C202 + ¢3v3 = 0; with c,¢2,cgnot all zero then the set of vectors 4,02,03 are said to be ‘A, linearly dependent B. linearly independent C.akemel —_D. an endomorphism 38)The gradient of the curve y = 3x* — 2x? + 5x —2 at the point (0,-2) is A.2 B.4 Cs D.6 then: /x Bicoshx=1/y C.coshy=y D. coshy = x 39) Ify = cosh™ A. coshx 40) (x + Va2=1)(x- V9== 1) = At Bl c D.xt-1 SECTION STRUCTURAL (80 MARKS) 1, ANALYSIS (30 Marks) 1.1 (@) A veal valued function f(z). is defined by f(x) = Vx=#x=T2. Determine the domain and range of f(x), 14510" (>) @__ Using any of the limit theorems, evaluate lim, 5 Gi) If Unss = JUn FH, Uy = 1, prove that: lim Un = 30+ ¥5). (5+ 5 marks) 12 (@ Using the Laplace Transforms or the method of undetermined coefficients, solve the ferential equation ¥"(x) + Y@)=x, ¥O)=0, Y'O)=2. (b) Given the funtion, FG), where FQ) = {9° ~G Sg period = 10, i - S,.0

You might also like