Info Ashu 5th FINAL - Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

ALLIANCE COLLEGE

COLLEGE OF UG
FINAL EXAM
Course Information Exam
Facility E. Year Program
Title Assurance and Date

Security
Course IT A. Year 5th 2 Max. 40
Department Semester
Code Weight
Instructor Tsegaye.B Level Section Time
C. Year
Name Allowed

Name _____________________________ ID. No ___________ Section _____

INSTRUCTION
 Make sure the exam paper contains 2 pages including the cover page.
 Make sure the exam paper contains the appropriate number of question in
appropriate parts.
 Answer the question according to the instructions given for each part.
 Write your answer neatly on the space provided.
 Mobile phone should be switched off.
 Cheating in any form will result punishment without prior notice.

PART I: Write “True” if the statement is correct and “False” if the statement is
incorrect [ 1pts.]

1. Network Security refers to the tools and practices that organizations use to
defend software applications against attack.
2. The virus's signature is important for creating a program, called a virus
scanner, that can automatically detect and, in some cases, remove viruses.
3. A Salami Attack is when small attacks add up to one major attack that can go
undetected due to the nature of this type of cybercrime.
4. A vulnerability is any mistakes or weakness in the system security procedures,
design, implementation or any internal control that may result in the violation
of system's security policy .
5. Black Box Testin is a Testing within the internal network with the knowledge
of internal network and system.

PART II: Choose the best answer from the given alternative [ 1.5 pts.]

1. What does a firewall act as for a computer network?

A. Gatekeeper B. Traffic controller C. Protector D. Analyzer

2.Which function does the firewall perform in the context described?

A. Monitor network traffic B. Block malicious traffic

C. Enhance network speed D. Create a virtual private network

3. What is one of the advantages of using firewalls mentioned in the text?

ALLIANCE COLLEGE Page 1


ALLIANCE COLLEGE
COLLEGE OF UG
MID EXAM
A. Enhanced security and privacy B. Faster internet speed

C. More storage space D. Improved user interface

4. What type of firewall permits or blocks network traffic based on state, port, and
protocol?

A. Stateful Inspection B .Next-Generation Firewall

C. Unified Threat Management (UTM) Firewall D. Threat-Focused NGFW

5. What type of firewall controls data flow to and from a network?

A. Packet Filtering B. Proxy Service Firewall

C. Stateful Inspection Firewall D. Intrusion Detection System

6. Which of the following algorithms allows two parties to securely establish a


shared secret key over an insecure channel?

A. Rivest-Shamir-Adleman (RSA) B. Diffie-Hellman (DH)

C. Digital Signature Algorithm (DSA) D. Advanced Encryption Standard

7. In the RSA algorithm, what is the purpose of the public exponent (e)?

A. To generate the public key B. To encrypt messages

C. To decrypt messages D. All of the above

8. What is the main advantage of using a Certificate Authority (CA) in public key
cryptography?

A. To generate strong encryption keys

B. To verify the identity of entities associated with public keys

C. To improve the speed of encryption and decryption

D. To reduce the key size required for secure communication

9. When using the Diffie-Hellman algorithm, what information is never directly


exchanged between the two parties?

A. The public key of one-party B. The private key of one party

C. The shared secret key D. A large prime number (p)

10. Public key cryptography is primarily used for:

A. Bulk encryption of large datasets

B. Secure key exchange and digital signatures


ALLIANCE COLLEGE Page 2
ALLIANCE COLLEGE
COLLEGE OF UG
MID EXAM
C. Symmetric encryption of messages

D. Data compression

11. What is the primary purpose of cryptography?

A. Encrypting data B. Analyzing data C. Coding data D. Transferring data

12. Which type of firewall adds application-level inspection, intrusion prevention, and
information from outside the firewall?

A. Stateful Inspection B. Next-Generation Firewall


C. Unified Threat Management (UTM) Firewall D. Threat-Focused NGFW

13. A UTM device generally integrates the capabilities of which types of firewalls
in a loosely linked manner?

A. Stateful Inspection B. Next-Generation Firewall


C. Unified Threat Management (UTM) Firewall D. Threat-Focused NGFW

14. What is the main purpose of the RSA algorithm?

A. Data compression B. Data encryption C. Data authentication D. Data hashing

15. What is the main purpose of a Certificate Authority (CA)?

A. Issuing digital certificates B. Creating public keys


C. Storing private keys D. Verifying passwords

16. Which information is NOT included in a certificate?

A. Users Name B. Issuing CA’s Signature C. Authentication Method D. Expiration Time

17. Which components are typically included in a PKI?

A. Hardware only B. Software and policies


C. Hardware, software, policies, and standards D. Digital certificates and keys

18. Which key element in a PKI is responsible for authenticating the identity of
individuals, computers, and other entities?

A. Certificate Authority (CA) B. Registration Authority (RA)

C. Certificate Database C. Certificate Store

19. What is the main purpose of a firewall in a network?

A. To provide internet connectivity to all devices


B. To protect the premises network from internet-based attacks
C. To slow down network traffic
D. To monitor user activities on the network

ALLIANCE COLLEGE Page 3


ALLIANCE COLLEGE
COLLEGE OF UG
MID EXAM
20. What are the key characteristics of the Internet Protocol (IP)?

A. Stateful, connection-oriented, ordered, reliable

B. Stateless, connectionless, unordered, unreliable

C. Stateless, connection-oriented, ordered, reliable

D. Stateful, connectionless, unordered, unreliable

PART VI: Short answer [ 2.5 pts.]


1. write Process of Vulnerability Assessment in detail.
2. List and explain types of vulnerability scanner in detail .

Bonas(5 pt)

1. Abebe wants to set up his own public and private keys. He chooses p =
11 and q = 3 with e = 3 and . Find d so that e X d has a remainder of 1
when divided by (p -1)(q-1).

GOOD LUCK

ALLIANCE COLLEGE Page 4

You might also like