Decm 033:Information And Communication Security Question Paper
Decm 033:Information And Communication Security
Course:Business Administration
Institution: Kenya Methodist University question papers
Exam Year:2010
INSTRUCTIONS Answer Question ONE and any Other TWO Questions
Question 1
a) Explain briefly criminal activities that may be directed to a computer processor? (5marks)
b) How would a computer memory be useful to a computer forensic expert? (5marks)
c) What is a key stroke logger and how is it used by criminals in computer systems (7marks)
d) Discuss various modes that can be used to destroy Hard Disks in high security environments? (8marks)
Question 2
a) Explain what we mean by automated attacks in computer systems. (5marks)
b) Discuss why internal attacks are more dangerous in regard to computer systems(15marks)
Question 3
a) Explain the term bits and bytes (6marks)
b) Signal interference is a potential avenues for data theft or destruction in a computer network. Discuss how network signal can be interfered with by criminal (14marks)
Question 4
a) Explain the term metropolitan area network. (5marks)
b) Why does network typology/layout matter to computer forensic investigator. Discuss
(12marks)
Question 5
a) Melisa has been common virus in networks. Describe briefly its characteristics. (6marks)
b) Compare and contrast the worm Nimda worm and the virus Melisa. (12marks)
Question 6
a) Explain the term network lacking (5marks)
b) Many network hackers bring down networks system by exploiting Transmission control protocol or internet protocol (12marks)
More Question Papers
Exams With Marking Schemes
Popular Exams
Mid Term Exams
End Term 1 Exams
End Term 3 Exams
Opener Exams
Full Set Exams
Return to Question Papers