0% found this document useful (0 votes)
336 views2 pages

Computer Security Mid Term Examination

This document outlines the sections and questions of a computer security midterm examination. It covers key topics in computer security including defining common terms like risk and vulnerability; distinguishing between different types of malware; analyzing myths about malware; describing common attacks like DDoS, SQL injection, and cross-site scripting; explaining the functions of firewalls, intrusion detection systems, and antivirus software; and identifying security risks, vulnerabilities, and the consequences of attacks. The exam aims to test students' understanding of fundamental computer security concepts and techniques.

Uploaded by

Jenet Silence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
336 views2 pages

Computer Security Mid Term Examination

This document outlines the sections and questions of a computer security midterm examination. It covers key topics in computer security including defining common terms like risk and vulnerability; distinguishing between different types of malware; analyzing myths about malware; describing common attacks like DDoS, SQL injection, and cross-site scripting; explaining the functions of firewalls, intrusion detection systems, and antivirus software; and identifying security risks, vulnerabilities, and the consequences of attacks. The exam aims to test students' understanding of fundamental computer security concepts and techniques.

Uploaded by

Jenet Silence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTER SECURITY MIDTERM EXAMINATION

QUESTION ONE (1)

a) Define the following term each carries 2 marks


I. Computer security
II. Risk
III. Vulnerability
IV. Threat
V. Attack

b) Summarise the differences between: viruses; worms; trojans and spyware. [12 Marks]

QUESTION TWO (2)

a) Analyse FOUR common myths about malware. [8 Marks]


b) State what is meant by the acronym 'DDoS'. [1 Mark]
c) Describe how a DDoS attack is performed. [5 Marks]
d) Describe the function of a firewall. [2 Marks]
e) Outline the process of ‘packet sniffing’. [3 Marks]

QUESTION THREE (3)

a) Explain what is meant by the term ‘SQL injection’. [2 Marks]


b) Explain TWO ways in which an SQL injection can be used to gain control of an account on a
website. [4 Marks]
c) Explain TWO ways to prevent ‘SQL injections’. [4 Marks]
d) Explain what an attack vector is. [2 Marks]
e) State what is meant by the term 'cross-site scripting'. [2 Marks]
f) Describe how cross-site scripting is performed. [5 Marks]

QUESTION FOUR

a) How intrusion detection systems (ADS) protect a computer system against attacks. [5
Marks]
b) Explain FIVE (5) symptoms of attack. [10 Marks]
c) List down any FIVE (5) consequences of successful attacks. [5 Marks]

QUESTION FIVE (5)

a) Explain any THREE (3) security risk exposed by vulnerability [6 Marks]


b) Explain how buffer overflow occurs [5 Marks]
c) Explain How Antivirus Works. [5 Marks]
d) What is different between Anti-spamware and Anti-spyware. [4 Marks]

You might also like