Get premium membership and access revision papers, questions with answers as well as video lessons.

Cisy 433/Bbit 447: Cryptography And Network Security Question Paper

Cisy 433/Bbit 447: Cryptography And Network Security 

Course:Computer Science

Institution: Kenya Methodist University question papers

Exam Year:2013



KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2013 (PT) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE
UNIT CODE : CISY 433/BBIT 447
UNIT TITLE : CRYPTOGRAPHY AND NETWORK SECURITY
TIME : 2 HOURS



INSTRUCTIONS : Answer ALL Questions in Section A in Section A & any other TWO Questions in Section B
SECTION A (30marks)
Question One
Define the following terms: (6marks)
Dual signature
S/MIME
Peer Entity authentication
Question Two
What are the main security threats in blue tooth data transfer? (2marks)
Question Three
What are the various message authentication requirements? (4marks)
Question Four
List the main SET participants. (3marks)
Question Five
Describe whirpool logic and how it is applied. (4marks)
Question Six
Describe the Verisign certificates in relations to certification authority (CA).
(4marks)
Question Seven
With examples, describe the THREE basic steps to create an RSA public/private key pair of PKC. (3marks)
Question Eight
Describe the penetration testing as applied in system security. (4marks)
SECTION B
Question One
Certificates and Certificates Authorities (CA) are necessary for widespread use of cryptography for e-commerce applications. Describe the contents of certificates and explain the specific functions of the certificates.
(6marks)
Show the procedure of creating set dual signature.
(8marks)
With one diagram show the message authentication code for authentication and confidentiality.
(6marks)
Question Two
Describe the IPsec and secure socket layer.
(5marks)
Define content filtering and describe the technologies used for content filtering.
(5marks)
Describe the phases of penetration testing and various types of penetration testing.
(10marks)
Question Three
Explain the process of deploying security management systems.
(6marks)
DES uses a 56 bit key. Infact the 56 bit key is divided into eight 7bit blocks and an 8th odd parity bit is added to each block. With the help of a diagram describe DES.
(10marks)
Describe FOUR main RFID security challenges and basic RFID protection mechanisms.
(5marks)






More Question Papers


Popular Exams


Mid Term Exams

End Term 1 Exams

End Term 3 Exams

Opener Exams

Full Set Exams



Return to Question Papers