0% found this document useful (0 votes)
186 views3 pages

SampleExam PDF

This document provides the pattern for the final exam in the course "Computer and Network Security". The exam will have two parts and last 2 hours. Part 1 will contain 60 multiple choice questions worth 1 point each. Part 2 will contain short answer and numerical questions worth 40 points total. Sample exam questions are provided covering topics like authentication, encryption algorithms, public key cryptography, and firewalls. The exam is scheduled on November 16th but the time and location are subject to change, so students should check their final exam schedule.

Uploaded by

john
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views3 pages

SampleExam PDF

This document provides the pattern for the final exam in the course "Computer and Network Security". The exam will have two parts and last 2 hours. Part 1 will contain 60 multiple choice questions worth 1 point each. Part 2 will contain short answer and numerical questions worth 40 points total. Sample exam questions are provided covering topics like authentication, encryption algorithms, public key cryptography, and firewalls. The exam is scheduled on November 16th but the time and location are subject to change, so students should check their final exam schedule.

Uploaded by

john
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ID NUMBER: ...................................

Name:.................................................

Computer and Network Security


Faculty of Education, Science, Technology and Mathematics
Pattern of Final Exam
Semester 2, 2016

Unit Name: Computer and Network Security


Time Allowed: 2 Hours
Permitted Material: Calculator
Total Points: 100
Examiner: Munawar Hayat
Contact Details: 02 6210 2920
Email: [email protected]

Instructions:
1. The final exam is currently scheduled for Wednesday 16 November at 9am in Building 4 (GYM). This
might change. Please check your final timetable.
2. The exam will have two parts. Part-1 will have 60 MCQs (one point each), while Part-2 will have short
descriptive questions (40 points total). Part 2 will also include short numerical calculations. Youre
allowed a scientific calculator.
3. You will have to attempt all questions in the exam.
4. Sample questions in the exam are given below.

Part-1: MCQs: Page 1 of 3

Part-1: MCQs
1. 1 point Verifying that users are who they say they are and that each input arriving at the system came
from a trusted source is
.
A. authenticity
B. credibility
C. accountability
D. integrity
2. 1 point A
of the ciphertext is obtained.

attack involves trying every possible key until an intelligible translation

A. brute-force
B. Caesar attack
C. ciphertext only
D. chosen plaintext
3. 1 point If both parties use only one key over a secure encrypted channel, such a system is referred to
as:
A. public-key encryption
B. two-key
C. asymmetric
D. symmetric encryption
4. 1 point Conidering all other parameters equal, larger block sizes mean greater security for block ciphers.
A. True
B. False
5. 1 point A digital signature can guarantee the source but not the integrity of the message.
A. True
B. False
6. 1 point X.509 defines the format for public-key certificates.
A. True
B. False
7. 1 point Frequent communication between end systems is encrypted using a

key.

A. session
B. master
C. permanent
D. message
8. 1 point A
firewall applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet.
A. host-based
B. packet filtering

Part-1: MCQs: Page 2 of 3

C. distributed
D. stateful inspection

Part-2: Descriptive Questions


For Part 2, You will be asked short descriptive questions. For some numerical problems, you are expected
to know steps involved in different public key algorithms such as RSA. Sample questions can be:
9. Consider the following parameters for RSA.
p=3
q = 17
e=3
For message M = 5, encrypt it using public key e and compute the value of the cipher-text C using
RSA.


10 3
10. Calculate the determinant mod 26 of
.
5 6
11. Consider the following alphabet to numeric mapping
a
0

b
1

c
2

d
3

e
4

f
5

g
6

.
.

.
.

z
25

A plaintext p=bad is encrypted using a simple substitution cipher. The key used for encryption is
cba. Determine the resulting ciphertext?
12. In order to use public key croptography for digital signatures, of the two keys (public and private), which
key is used for encryption and which key is used for decryption?

Part-1: MCQs: Page 3 of 3

You might also like