This document contains instructions for a cyber security exam consisting of 5 questions with multiple parts each. The exam is worth 2 credit units and allows 2 hours for completion. Students must answer question 1 and any two other questions of their choice. Question 1 has 5 subparts related to classification of cyber crimes, firewall limitations, levels of computer ethics, types of malware, and ways malware enters computer systems. The other questions address topics like benefits of cybersecurity, filtering rules, types of cyber crimes and firewall characteristics, uses and protocols of virtual private networks, and objectives of ethics codes and types of cyber laws.
This document contains instructions for a cyber security exam consisting of 5 questions with multiple parts each. The exam is worth 2 credit units and allows 2 hours for completion. Students must answer question 1 and any two other questions of their choice. Question 1 has 5 subparts related to classification of cyber crimes, firewall limitations, levels of computer ethics, types of malware, and ways malware enters computer systems. The other questions address topics like benefits of cybersecurity, filtering rules, types of cyber crimes and firewall characteristics, uses and protocols of virtual private networks, and objectives of ethics codes and types of cyber laws.
This document contains instructions for a cyber security exam consisting of 5 questions with multiple parts each. The exam is worth 2 credit units and allows 2 hours for completion. Students must answer question 1 and any two other questions of their choice. Question 1 has 5 subparts related to classification of cyber crimes, firewall limitations, levels of computer ethics, types of malware, and ways malware enters computer systems. The other questions address topics like benefits of cybersecurity, filtering rules, types of cyber crimes and firewall characteristics, uses and protocols of virtual private networks, and objectives of ethics codes and types of cyber laws.
Faculty of Sciences Department of Computer Science 2022_2 Examinations COURSE CODE: CIT410 COURSE TITLE: Cyber-Security CREDIT: 2 Units TIME ALLOWED: 2 Hours INSTRUCTION: Answer Question ONE (1) and any other TWO (2) Questions
1a. Describe the different classification of cyber-crimes? (6 marks)
1b. Explain any four (4) limitation of firewall? (8 marks) 1c. Explain the three levels of computer ethics (6 marks) 1d. Describe any five (5) types of malwares (5 marks) 1e. List any ten (10) ways Malware get into a computer system (5 marks)
2a. Explain any six (6) gains of implementing and maintaining cybersecurity practices (12 marks) 2b. Filtering rules are based on information contained in a network packet. Discuss the rules (8 marks)
3a. Describe any seven (7) types of cyber-crimes (14 marks)
3b. Write on any three (3) characteristics of firewalls (6 marks)
4a. what are the significance of a virtual private network? (8 marks)
4b. What are the common network protocols being used within VPN tunnels (12 marks)
5a. Write on any 5 objectives of Codes of Ethics (10 marks)
5b. Describe any five (5) types of cyber laws? (10 marks)