Cisy 433/Bbit 447: Cryptography And Network Security Question Paper
Cisy 433/Bbit 447: Cryptography And Network Security
Course:Computer Science
Institution: Kenya Methodist University question papers
Exam Year:2013
KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2013 (PT) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE
UNIT CODE : CISY 433/BBIT 447
UNIT TITLE : CRYPTOGRAPHY AND NETWORK SECURITY
TIME : 2 HOURS
INSTRUCTIONS : Answer ALL Questions in Section A in Section A & any other TWO Questions in Section B
SECTION A (30marks)
Question One
Define the following terms: (6marks)
Dual signature
S/MIME
Peer Entity authentication
Question Two
What are the main security threats in blue tooth data transfer? (2marks)
Question Three
What are the various message authentication requirements? (4marks)
Question Four
List the main SET participants. (3marks)
Question Five
Describe whirpool logic and how it is applied. (4marks)
Question Six
Describe the Verisign certificates in relations to certification authority (CA).
(4marks)
Question Seven
With examples, describe the THREE basic steps to create an RSA public/private key pair of PKC. (3marks)
Question Eight
Describe the penetration testing as applied in system security. (4marks)
SECTION B
Question One
Certificates and Certificates Authorities (CA) are necessary for widespread use of cryptography for e-commerce applications. Describe the contents of certificates and explain the specific functions of the certificates.
(6marks)
Show the procedure of creating set dual signature.
(8marks)
With one diagram show the message authentication code for authentication and confidentiality.
(6marks)
Question Two
Describe the IPsec and secure socket layer.
(5marks)
Define content filtering and describe the technologies used for content filtering.
(5marks)
Describe the phases of penetration testing and various types of penetration testing.
(10marks)
Question Three
Explain the process of deploying security management systems.
(6marks)
DES uses a 56 bit key. Infact the 56 bit key is divided into eight 7bit blocks and an 8th odd parity bit is added to each block. With the help of a diagram describe DES.
(10marks)
Describe FOUR main RFID security challenges and basic RFID protection mechanisms.
(5marks)
More Question Papers