(Cisy 433) (Bbit 447): Cryptopraphy And Network Question Paper
(Cisy 433) (Bbit 447): Cryptopraphy And Network
Course:Computer Science & Business Information
Institution: Kenya Methodist University question papers
Exam Year:2013
KENYA METHODIST UNIVERSITY
END OF 3''RD ''TRIMESTER 2013 (FT) EXAMINATION
FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS INFORMATION
UNIT CODE : CISY 433/BBIT 447
UNIT TITLE : CRYPTOPRAPHY AND NETWORK
TIME : 2 HOURS
INSTRUSTIONS: Answer all question in section A and two in section B.
Section A: Answer all questions.
Question One
Define the following terms.
(6mks)
Origin non-repudiation
Digital signature
Authentication
List two instant messaging security threats.
(2mks)
Describe three cryptographic scheme SKC, PKC, and Hash functions.
(6mks)
Describe S/MIME certificate processing.
(4mks)
Describe whilepool logic.
(4mks)
Describe the penetration testing as applied in system securing. (4mks)
With examples show that KA=KB, using diffie-hellman Algorithm. (4mks)
Section B: Answer two questions in this section
Question Two
Describe four main RFID security challenges and basic RFID protection mechanism.
(5mks)
Discuss five evidence roles of network forensic.
(5mks)
Describe SET requirements, features and with the help of a diagram show all the set system participants.
(5mks)
Question Three
Describe the phases of penetration testing and various types of penetration testing.
(6mks)
Describe clearly the basic steps to create a RSA public private key. (6mks)
Show the formula for DES cryptographic algorithm and list the 16 round of permutation with a diagram.
(8mks)
Question Four
With one diagram show the message authenticaition code for Authentication and confidentiality and digital signature.
(5mks)
Briefly describe Kerbero Authentication and certificates.
(10mks)
With a diagram, describe two designs of firewalls.
(5mks)
More Question Papers