Info Ashu 5th FINAL - Exam
Info Ashu 5th FINAL - Exam
Info Ashu 5th FINAL - Exam
COLLEGE OF UG
FINAL EXAM
Course Information Exam
Facility E. Year Program
Title Assurance and Date
Security
Course IT A. Year 5th 2 Max. 40
Department Semester
Code Weight
Instructor Tsegaye.B Level Section Time
C. Year
Name Allowed
INSTRUCTION
Make sure the exam paper contains 2 pages including the cover page.
Make sure the exam paper contains the appropriate number of question in
appropriate parts.
Answer the question according to the instructions given for each part.
Write your answer neatly on the space provided.
Mobile phone should be switched off.
Cheating in any form will result punishment without prior notice.
PART I: Write “True” if the statement is correct and “False” if the statement is
incorrect [ 1pts.]
1. Network Security refers to the tools and practices that organizations use to
defend software applications against attack.
2. The virus's signature is important for creating a program, called a virus
scanner, that can automatically detect and, in some cases, remove viruses.
3. A Salami Attack is when small attacks add up to one major attack that can go
undetected due to the nature of this type of cybercrime.
4. A vulnerability is any mistakes or weakness in the system security procedures,
design, implementation or any internal control that may result in the violation
of system's security policy .
5. Black Box Testin is a Testing within the internal network with the knowledge
of internal network and system.
PART II: Choose the best answer from the given alternative [ 1.5 pts.]
4. What type of firewall permits or blocks network traffic based on state, port, and
protocol?
7. In the RSA algorithm, what is the purpose of the public exponent (e)?
8. What is the main advantage of using a Certificate Authority (CA) in public key
cryptography?
D. Data compression
12. Which type of firewall adds application-level inspection, intrusion prevention, and
information from outside the firewall?
13. A UTM device generally integrates the capabilities of which types of firewalls
in a loosely linked manner?
18. Which key element in a PKI is responsible for authenticating the identity of
individuals, computers, and other entities?
Bonas(5 pt)
1. Abebe wants to set up his own public and private keys. He chooses p =
11 and q = 3 with e = 3 and . Find d so that e X d has a remainder of 1
when divided by (p -1)(q-1).
GOOD LUCK